Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/12/18 in all areas

  1. Cumparati si voi o tema...
    3 points
  2. De ce nu te-ai adresat unui service autorizat ? S-au te-ai gândit cumva ca ne duci cu zaharelul indianule?
    2 points
  3. 2 points
  4. Sclipici la username... club de gaylorzi? @SilenTx0 sho' pe ei! Vezi @Nytro daca nu l-ai pus pe @wildchild sa isi ceara scuze public de la Aerosol si Kronzy pentru downgrade...
    2 points
  5. Cred ca ar trebui sa fie un filtru sau un buton ceva atunci cand iti faci cont pe forum, gen "Promit ca nu doresc invitatie pe filelist"
    2 points
  6. @Spionul007 1. Daca e totul 100% legal si corect ia zi aicea sau prin PM ce e toata treaba. De unde atatea secrete si intalniti? Zi pe clar ce vrei sa faci, sa stie si omul daca e suficient de iscusit inainte de intalnire. 2. Unde ai gasit tu foarte multe propuneri si cativa baieti sa se intalneasca cu tine? Zi cinstit ca nu te-a bagat nimeni in seama. Nu zici ce vrei sa faci, nu dai un pret, scrii intrun still foarte ciudat. Eu daca te-as vedea pe trotuar trec strada...
    1 point
  7. GoPro HERO5 Black - 900 Lei https://carrefour.ro/produse/camera-video-sport-ultra-hd-gopro-hero5-black-wi-fi-bluetooth-4k-19-44501223
    1 point
  8. 1 point
  9. Customized PSExec via Reflective DLL July 13, 2018 ~ cplsec Hey all, I’m back in the pocket after doing the deep dive into hack the box. I really enjoyed the bulk of the challenges and learned some new great tricks and techniques. One box I highly recommend is Reel. It’s a great challenge with domain privilege escalation techniques that you might see in a pentest. Anyways, after reaching Guru status I decided to take a step back for a while, it’s a part-time job working all the newly released boxes. Before I went dark I was testing Cobalt Strike’s built-in PSExec module against various Endpoint Protection Platform (EPP) products and was getting flagged. It was pretty clear that the EPPs weren’t detecting the binary but was instead flagging via heuristic analysis. It might have been the randomized filename of the binary, the timing, writing to the $ADMIN share, or some sort of combination. I wrote some skeleton code that can be further customized to help bypass heuristic analysis. The current flow of the reflective DLL and Aggressor script can be seen below. You can find the code at https://github.com/ThunderGunExpress/Reflective_PSExec The code and script is pretty crude and has the following limitations at the moment: Use an IP address as the target, not a hostname If running against a remote target ensure the session is in a medium integrity context If running against a local target ensure the session is a high integrity context Sursa: https://ijustwannared.team/2018/07/13/customized-psexec-via-reflective-dll/
    1 point
  10. 0 points
  11. -1 points
  12. DA, RST TREBUIE SA FIE O UNICA SURSA DE BOGATIE IN ALE HACKINGULUI INTERNATIONAL AN PLM DE INCULT.
    -1 points
  13. SA TE IAU PE BASTON IEFTIN
    -1 points
  14. Bună! Ma poate ajuta cineva cu o invitație filelist? Aștept PM, mulțumesc!
    -2 points
×
×
  • Create New...