Finally I've got RCE with CVE-2019-0708 on Win7 x64 (#BlueKeep). Thanks @ryHanson@twitter.com for the help.
LOL .... still don't know if it worked... or she was a tech nerd screwing around, but still lol 🤣🤣🤣
TFW you are passing through a border police checkpoint and the screen is merely showing “exploit.bat”. @ANSSI_FR@twitter.com may wish to look at network at CDG airport.
Security 101: Linux meme with twist
I added a ton new tools and configurations to my Kali setup script if anyone is interested. It installs a bunch more tools and pulls lots of GitHub projects into /opt. Modify lines 12-18 to what you would like. #kali #infosec
Defending Windows Domain Against Mimikatz Attacks
For an idea of how stupid powerful http://FindClone.ru is, I was watching some old video of thugs attacking a Kyiv Pride Parade, and wondered if I could face-match this super low-res face.
Turns out: yes. Very first result - hello Igor, who was apparently the head of Kyiv SNA
Linux for Pentester: APT Privilege Escalation
Exploiting Sudo rights: Method -I
sudo apt-get update -o APT::Update::Pre-Invoke::= /bin/bash
"meterpreter session 1 opened" in a nutshell
😍 this is a neat and novel way of programming something. No toolchian to setup for people who want your device/bling/badge but maybe aren't that tech savvy. Wonder what the limitations are (if any?). https://twitter.com/Kabong/status/1117507380848279552
When I find unlocked workstations at our office, I used to leave post-it notes on them. Nowadays I just run CALC.EXE and leave it open. Scares them much better.
Quand on te dit qu'il faut absolument "uTiLisEr dOcKeR"
🇫🇷 Technicien en Informatique industrielle | LP ASSR - CyberDéfense | Pentester Wannabe (╯°□°)╯︵ ┻━┻
A Mastodon instance for info/cyber security-minded people.