RUMAIS (@rum4is) 's Twitter Profile
RUMAIS

@rum4is

Penetration Tester

ID: 2571301226

linkhttps://rumaiiis.github.io/ calendar_today16-06-2014 17:11:05

12,12K Tweet

1,1K Followers

970 Following

#RaviVisvesvarayaSharadaPrasad #Telecom #InfoTech (@rvp) 's Twitter Profile Photo

Is the UK government prepared for its greatest threat? dlvr.it/STJ8rq #news #cybersecurity #infosec x.com/DeepFriedCyber… #RaviVisvesvarayaSharadaPrasad #IoT #IIoT #InternetOfThings #IndustrialInternetOfThings #QuantumComputing #CloudCompu…

Is the UK government prepared for its greatest threat? dlvr.it/STJ8rq #news #cybersecurity #infosec   x.com/DeepFriedCyber…  #RaviVisvesvarayaSharadaPrasad #IoT #IIoT #InternetOfThings #IndustrialInternetOfThings #QuantumComputing #CloudCompu…
Shah Sheikh (@shah_sheikh) 's Twitter Profile Photo

VMware Plugs Critical Carbon Black App Control Flaw: VMware issues a critical fix for a vulnerability that allows hacker to gain full access to the underlying server operating system. The post VMware Plugs Critical Carbon Black App Control Flaw… securityweek.com/vmware-plugs-c…

VMware Plugs Critical Carbon Black App Control Flaw: VMware issues a critical fix for a vulnerability that allows hacker to gain full access to the underlying server operating system. 

The post VMware Plugs Critical Carbon Black App Control Flaw… securityweek.com/vmware-plugs-c…
Man Yue Mo (@mmolgtm) 's Twitter Profile Photo

CVE-2022-25664 is one of the most interesting bug I've reported. It's "only" an info leak, but a very powerful one that allows an untrusted Android app to read pages of memory from the kernel or other apps any number of times. github.blog/2023-02-23-the…

proxylife (@pr0xylife) 's Twitter Profile Photo

#Emotet- epoch4 - .zip > .doc > .dll WINWORD.EXE /n INVOICE 589 03_23.doc /o https://midcoastsupplies.]com].au/configNQS/Es2oE4GEH7fbZ/?135704 regsvr32.exe C:\Windows\system32\MSBjdGgEfuEG\evPaAyJzdCSx.dll IOC's github.com/pr0xylife/Emot…

#Emotet- epoch4 - .zip > .doc > .dll

WINWORD.EXE /n INVOICE 589 03_23.doc /o

https://midcoastsupplies.]com].au/configNQS/Es2oE4GEH7fbZ/?135704

regsvr32.exe C:\Windows\system32\MSBjdGgEfuEG\evPaAyJzdCSx.dll

IOC's
github.com/pr0xylife/Emot…
Max_Malyutin (@max_mal_) 's Twitter Profile Photo

Undead #Emotet is Back🧟‍♂️500MB #MalDoc 🚨 Ivan is back with old-school #TTPs: [+] AutoOpen VBA MalDoc macro - T1059.005 [+] Regsvr32 T1218.010 [+] System Network Discovery T1016 [+] Registry Run T1547.001 #DFIR Exec Flow: Winword.exe > Regsvr32.exe 💥

Undead #Emotet is Back🧟‍♂️500MB #MalDoc 🚨

Ivan is back with old-school #TTPs:
[+] AutoOpen VBA MalDoc macro - T1059.005
[+] Regsvr32 T1218.010
[+] System Network Discovery T1016
[+] Registry Run T1547.001

#DFIR Exec Flow: Winword.exe > Regsvr32.exe 💥
The Information Security Collective | 501(c)3 (@infosectogether) 's Twitter Profile Photo

🚨 Giveaway 🚨 Do we need a reason to hold a giveaway? We want to give away two TCM Security vouchers! (1) Practical Web Application Penetration Testing AND (1) Practical Ethical Hacking All you have to do to enter is: 1️⃣ Retweet this Tweet 2️⃣ Make sure you’re following

RUMAIS (@rum4is) 's Twitter Profile Photo

Terminator Evade All Detection: PowerShell Script for Terminating Protected Processes with In-Memory Execution and HVCI Bypass (AV|EDR|XDR Evasion Technique) - POC in CrowdStrike" ~ xio #TerminatorScript #AVEDRXDR #POCinCrowdStrike #cybersecurity #avevasion #EDR #Crowdstrike

John Hammond (@_johnhammond) 's Twitter Profile Photo

The MOVEit Transfer exploitation is not just SQL injection(👀) We uncovered the very last stage of the attack chain to drop human2.aspx ultimately ends up gaining remote code execution ‼ We fully recreated the attack chain with a demo achieving a reverse shell & ransomware!

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Active Directory Exploitation: Lateral Moment Pass the Ticket Attack hackingarticles.in/lateral-moveme… Pass the Cache hackingarticles.in/lateral-moveme… Over Pass the Hash hackingarticles.in/lateral-moveme… Pass the Hash Attack hackingarticles.in/lateral-moveme… #infosec #cybersecurity #cybersecuritytips #pentesting

Active Directory Exploitation: Lateral Moment

Pass the Ticket Attack
hackingarticles.in/lateral-moveme…

Pass the Cache
hackingarticles.in/lateral-moveme…

 Over Pass the Hash
hackingarticles.in/lateral-moveme…

Pass the Hash Attack
hackingarticles.in/lateral-moveme…

#infosec #cybersecurity #cybersecuritytips #pentesting
CyberKnow (@cyberknow20) 's Twitter Profile Photo

Why haven't we labelled it scavenger intelligence? I'm not sure 🤷‍♂️🤷‍♂️🤷‍♂️ #scavint #cybersecurity #infosec

Why haven't we labelled it scavenger intelligence? I'm not sure 🤷‍♂️🤷‍♂️🤷‍♂️
#scavint

#cybersecurity #infosec