cbHu3 (@_cbhue_) 's Twitter Profile
cbHu3

@_cbhue_

Nobody Cares. Work Harder! 😈 OSCP | OSCE | CISSP | GWAPT | CEH

ID: 1082708154385924106

linkhttps://github.com/CBHue calendar_today08-01-2019 18:38:34

205 Tweet

169 Followers

176 Following

wvu (@wvuuuuuuuuuuuuu) 's Twitter Profile Photo

Uploaded a few of my notes and PoCs from investigating CVE-2021-22986 (F5 iControl REST) this past week. attackerkb.com/assessments/f6…

Omar Ωr Santos (@santosomar) 's Twitter Profile Photo

MANSPIDER - Spider Entire Networks For Juicy Files Sitting On SMB Shares. Search Filenames Or File Content - Regex Supported! ift.tt/3xR7jyX #cybersecurity #bugbountytips #hacking #tools

MANSPIDER - Spider Entire Networks For Juicy Files Sitting On SMB Shares. Search Filenames Or File Content - Regex Supported! ift.tt/3xR7jyX #cybersecurity #bugbountytips #hacking #tools
Casey Cammilleri (@caseycammilleri) 's Twitter Profile Photo

[BLOG] Exploiting Log4j against Ubnt Unifi. Great post ex walkthrough by ed that leads to multi-product access. sprocketsecurity.com/blog/another-l…

TOOOL (@toool) 's Twitter Profile Photo

It seems 2021 continues to be full of unexpected challenges. TOOOL has an announcement and letter from our Board of Directors that we are sharing with all of you as this year comes to a close... toool.us/files/TOOOL_20… youtube.com/watch?v=S26Srn…

IPinfo – IP Data Provider (@ipinfo) 's Twitter Profile Photo

This Saturday, 23rd of April, is IPInfo's 9th birthday! 🎂🎉 To celebrate, we are giving away: 🥉 5x basic plans 🥈 3x standard plans 🥇 1x business plan To enter simply follow @ipinfoio and retweet this! 🚀

briankrebs (@briankrebs) 's Twitter Profile Photo

1/ So you go shopping for a PIV card reader, because the US govt gave you one and you're curious to look at what's on it. You settle for this "DOD military USB common access smart card reader," because it's compatible with Mac OS. Cool! Only $15! What a bargain!

1/ So you go shopping for a PIV card reader, because the US govt gave you one and you're curious to look at what's on it. You settle for this "DOD military USB common access smart card reader," because it's compatible with Mac OS. Cool! Only $15! What a bargain!
LastPass (@lastpass) 's Twitter Profile Photo

We recently detected unusual activity within portions of the LastPass development environment and have initiated an investigation and deployed containment measures. We have no evidence that this involved any access to customer data. More info: blog.lastpass.com/2022/08/notice…

We recently detected unusual activity within portions of the LastPass development environment and have initiated an investigation and deployed containment measures. We have no evidence that this involved any access to customer data. More info: blog.lastpass.com/2022/08/notice…
n00py (@n00py1) 's Twitter Profile Photo

Slide from the CactusCon talk on all the ways to get data populated into BloodHound. Any that I missed? Which is your favorite?

Slide from the CactusCon talk on all the ways to get data populated into BloodHound. Any that I missed?  Which is your favorite?
Steve Campbell (@lpha3ch0) 's Twitter Profile Photo

Meterpreter getsystem tip: Here, I have a shell as a service account with the usual "SeImpersonatePrivilege" privilege enabled. The default "getsystem" command fails and I lose the shell, prob bc of antivirus, but "getsystem -t 6" works. You don't need to upload a "potato"

Meterpreter getsystem tip: Here, I have a shell as a service account with the usual "SeImpersonatePrivilege" privilege enabled. The default "getsystem" command fails and I lose the shell, prob bc of antivirus, but "getsystem -t 6" works. You don't need to upload a "potato"
icyguider (@icyguider) 's Twitter Profile Photo

SysWhispers3 has been added to Shhhloader! 😎 It should work with all current shellcode injection techniques. Some bug fixes also make this the most stable version yet. More updates to come, and thanks to klez for SW3. github.com/icyguider/Shhh…

S4ntiagoP (@s4ntiago_p) 's Twitter Profile Photo

🔥 Big update! Nanodump now supports the PPLMedic exploit! meaning you can dump LSASS on an up-to-date system with PPL enabled 😃 github.com/fortra/nanodump

Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

Rob Fuller I wrote this a few years ago, but I think it's still relevant, maybe it's helpful - specifically the bit you want is "how do you procure a red team?" medium.com/@dmchell/what-…

mpgn (@mpgn_x64) 's Twitter Profile Photo

Monday, June 26 in the evening, a new version of CrackMapExec will be published to everyone on github.com/mpgn/CrackMapE… 🚀 After nearly 12 months without update on the public repository, it is time ! 🍻 Blog post coming also ! 🦇 Thanks to all the sponsors on Porchetta Industries 🪂

Signal (@signalapp) 's Twitter Profile Photo

PSA: we have seen the vague viral reports alleging a Signal 0-day vulnerability. After responsible investigation *we have no evidence that suggests this vulnerability is real* nor has any additional info been shared via our official reporting channels.