Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation on 11/13/18 in Posts

  1. De ce nu te-ai adresat unui service autorizat ? S-au te-ai gândit cumva ca ne duci cu zaharelul indianule?
    3 points
  2. In caz de vrea cineva sa se isi "tuneze" masina https://github.com/jaredthecoder/awesome-vehicle-security
    2 points
  3. Si pe aici cate ceva: - https://github.com/commaai/ - https://comma.ai/
    2 points
  4. 2 points
  5. Iti dau eu idee, proiect de care am nevoie. In functie de cum lucrezi, imi faci si un pret. Ideea este simpla: am nevoie sa descarc ultimele configuratii ale unor routere Cisco/Juniper la ora 00:00 in fiecare noapte, cu scop de back-up. Tot ce trebuie tu sa faci este sa creezi un script, care se conecteaza automat prin SSH la routere, descarca configuratia(toate comenzile CLI de Cisco/Juniper le ofer eu) si sa le incarce in Cloud la o anumita adresa, sub forma de .txt, fiecare avand hostname-ul router-ului. Nu am nevoie de GUI. P.S: Este vorba de aproximativ 350 de routere, vorbind de un DataCenter.
    1 point
  6. spune ime-ul ca ti-l deblochez eu
    1 point
  7. @Spionul007 1. Daca e totul 100% legal si corect ia zi aicea sau prin PM ce e toata treaba. De unde atatea secrete si intalniti? Zi pe clar ce vrei sa faci, sa stie si omul daca e suficient de iscusit inainte de intalnire. 2. Unde ai gasit tu foarte multe propuneri si cativa baieti sa se intalneasca cu tine? Zi cinstit ca nu te-a bagat nimeni in seama. Nu zici ce vrei sa faci, nu dai un pret, scrii intrun still foarte ciudat. Eu daca te-as vedea pe trotuar trec strada...
    1 point
  8. Dar faptul ca ai postat aici ti-a crescut nivelul de bulan. Deci tot venim in Tenerife, pregateste haleala si pileala!
    1 point
  9. Va multumesc,am rezolvat problema,am lasat telef pe bar si l-a umflat cineva aseara...ce dobitoci,aveam un x si huawei-ul defect pe bar si ei au furat pe ala defect..
    1 point
  10. Customized PSExec via Reflective DLL July 13, 2018 ~ cplsec Hey all, I’m back in the pocket after doing the deep dive into hack the box. I really enjoyed the bulk of the challenges and learned some new great tricks and techniques. One box I highly recommend is Reel. It’s a great challenge with domain privilege escalation techniques that you might see in a pentest. Anyways, after reaching Guru status I decided to take a step back for a while, it’s a part-time job working all the newly released boxes. Before I went dark I was testing Cobalt Strike’s built-in PSExec module against various Endpoint Protection Platform (EPP) products and was getting flagged. It was pretty clear that the EPPs weren’t detecting the binary but was instead flagging via heuristic analysis. It might have been the randomized filename of the binary, the timing, writing to the $ADMIN share, or some sort of combination. I wrote some skeleton code that can be further customized to help bypass heuristic analysis. The current flow of the reflective DLL and Aggressor script can be seen below. You can find the code at https://github.com/ThunderGunExpress/Reflective_PSExec The code and script is pretty crude and has the following limitations at the moment: Use an IP address as the target, not a hostname If running against a remote target ensure the session is in a medium integrity context If running against a local target ensure the session is a high integrity context Sursa: https://ijustwannared.team/2018/07/13/customized-psexec-via-reflective-dll/
    1 point
This leaderboard is set to Bucharest/GMT+02:00
×
×
  • Create New...