Тёмный
SnapAttack
SnapAttack
SnapAttack
Подписаться
Adversary's Arsenal  - T1053 - Scheduled Tasks
21:12
10 месяцев назад
Комментарии
@rustyshackleford1379
@rustyshackleford1379 Месяц назад
That diagram helped me with a CTF, thx
@texastitan6567
@texastitan6567 Месяц назад
Htb compiled? Lol
@rustyshackleford1379
@rustyshackleford1379 Месяц назад
@@texastitan6567 Hahaaaaaaa, how did you know?
@texastitan6567
@texastitan6567 Месяц назад
@@rustyshackleford1379 haha cause it helped me too lmao!
@adibnayafabdala
@adibnayafabdala 26 дней назад
Hey you can helpe? I have many doubts about these machine
@texastitan6567
@texastitan6567 26 дней назад
@@adibnayafabdala have you got a foothold/user yet?
@user-xk5cu8xq5x
@user-xk5cu8xq5x Месяц назад
Bravo mostang panda
@user-rt9vz9oi2c
@user-rt9vz9oi2c Месяц назад
This is great information thanks. Do you have any information about the new Outlook threat. earlier this week
@vforv2416
@vforv2416 Месяц назад
How to remove Mustangpanda.a from USB. Drive.?
@Jacob-ABCXYZ
@Jacob-ABCXYZ 3 месяца назад
Oh this is interesting
@sabyasachisahoo8975
@sabyasachisahoo8975 3 месяца назад
Thanks for uploading this kind awesome video,keep uploading we need this kind of videO Thanks
@alabamacajun7791
@alabamacajun7791 3 месяца назад
Check your mic settings. The audio is about a 3 where the commercials are 7 out of 10. Subscribed.
@snapattackhq
@snapattackhq 3 месяца назад
Thanks for the feedback! I will play around with my mic settings to try and fix this.
@user-zu4ft8yw9e
@user-zu4ft8yw9e 4 месяца назад
The stages involved in resolving problems related to CVE-2023-34362 include: 1. Detection: Identify the presence of the vulnerability in the system, in this case, the remote code execution vulnerability in MOVEit Transfer. 2. Patching: Apply the necessary security updates provided by the vendor, in this case, Progress, to address the vulnerability and prevent exploitation. 3. Mitigation: Implement additional security measures or configurations to reduce the risk of exploitation while waiting for the patch to be applied. 4. Monitoring: Continuously monitor the system for any signs of exploitation or unusual activities to ensure the vulnerability is effectively addressed. 5. Communication: Inform relevant stakeholders within the organization about the vulnerability, its impact, and the actions being taken to mitigate the risk. By following these stages, organizations can effectively resolve problems related to CVE-2023-34362 and enhance the security of their systems.
@user-zu4ft8yw9e
@user-zu4ft8yw9e 4 месяца назад
The stages involved in decoding CVE-2023-34362 include verification, assignment of a CVE ID, description creation, vetting process, and potential modification. Problems with this process can be addressed by ensuring accurate verification, thorough description, proper vetting, and timely reanalysis for any modifications.
@FahimKhalid-ov9wi
@FahimKhalid-ov9wi 5 месяцев назад
this cve i think not work in this time ?
@m6985
@m6985 5 месяцев назад
How can I subscribe ??
@believeit5450
@believeit5450 5 месяцев назад
thanks SnapAttack !
@TRYTOHUNT
@TRYTOHUNT 5 месяцев назад
Sorry self promotion BUG BOUNTY POC ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-17zlPTSz7B8.html
@mystery7957
@mystery7957 6 месяцев назад
How to get Event ID 25 Outlook?
@marcinbykos7066
@marcinbykos7066 6 месяцев назад
great stuff, always a pleasure to watch :-)
@mukeshsingh7069
@mukeshsingh7069 6 месяцев назад
Great Walkthrough 👏👏👏
@admaiusbonum977
@admaiusbonum977 9 месяцев назад
nice! Good tool SnapAttack Enterprise Edition is. great content and tool creators on your platform as well!
@user-vn9um5si7l
@user-vn9um5si7l 9 месяцев назад
Can you share the exploit code?
@Cooliofamily
@Cooliofamily 9 месяцев назад
Awesome videos - wealth of knowledge on all of your content - thanks for everything !
@UrsRau
@UrsRau 9 месяцев назад
the info on CVE-2023-42793 is not showing on the community edition? And I can't see how to even look at what it would cost to subscribe and be able to use and contribute to ongoing attacks?
@Mechanicguybob
@Mechanicguybob 10 месяцев назад
Thanks for posting!
@Corybcrook
@Corybcrook 10 месяцев назад
Do you have a community addition of SnapAttack?
@Corybcrook
@Corybcrook 10 месяцев назад
I really liked this demo I'm going to subscribe keep pumping out the content
@giapacella6771
@giapacella6771 11 месяцев назад
Shared on my Truth Social Account
@TunaIRL
@TunaIRL Год назад
cool video
@TheSock
@TheSock Год назад
Great narrative, nice vid 🤙
@kevinwong_2016
@kevinwong_2016 Год назад
These ads are even on RU-vid 💀
@GenesisFont
@GenesisFont Год назад
How was the initial shell established. The diagram showed step 1 as running ssh commands from the beginning. What was step zero that got me a shell in the first place?? That said, I'm unclear what the compromise is, because if I'm starting with shell to begin with, then it doesn't matter the language of the tool I use for persistence. Anyway, I was trying to follow along closely, but I didn't see the initial compromise to the linux router. What vendor of router are we even talking about? What CVE should we be concerned with. Lots of missing information, although I enjoy the direction you're heading in.
@debugin1227
@debugin1227 Год назад
Au = Australia
@CoreyLahrmer
@CoreyLahrmer Год назад
Wish I found this channel sooner. Thanks for the heads up. Exfil in azure/office 365 is becoming all too common
@TheAnurag69
@TheAnurag69 Год назад
You are doing really great, you are a hidden gem that people are not aware of. I am glad I found you.
@AnnieNelson-wo6bm
@AnnieNelson-wo6bm Год назад
How do i get rid of it
@wingsofsuspensionlifts6814
@wingsofsuspensionlifts6814 Год назад
feels like 2005 sql injection? haha
@user-di8fc9uc7t
@user-di8fc9uc7t Год назад
Hi,what is the version number of CALDERA demonstrated in your video? There seems to be some correlation between YAML execution and caldera version numbers.
@guysingstohiscat
@guysingstohiscat Год назад
Great video!
@torusx8564
@torusx8564 Год назад
amongus.
@mort_brain
@mort_brain Год назад
This channel is really underrated.
@apIthletIcc
@apIthletIcc Год назад
next up, NK apt's posing as chinese steel company's Hr personnel. people act like they dont give a shit lol they will when that shit hits the 'fan'
@skullface7
@skullface7 Год назад
Hey is there a way to get your Microsoft account back from a hacker because my account got hacked and I can do anything 😢😢😢😢
@Jagtr0n
@Jagtr0n Год назад
Just stumbled upon this channel, great video keep up the work.
@islamictv8433
@islamictv8433 Год назад
nice video but can you please zoom the terminal font please
@adriangheorghiu8223
@adriangheorghiu8223 Год назад
It take a long while till they(Russians ) are down. Just ask myself if they don't have anything similar in the wild now.
@drmikeyg
@drmikeyg Год назад
Great video Tim. Those Russian snakes are really slippery.
@snapattackhq
@snapattackhq Год назад
Thanks!
@tactical_arabe
@tactical_arabe Год назад
Underrated channel
@snapattackhq
@snapattackhq Год назад
Thank you! We hope to help everyone better understand threats and identify hunt/detection opportunities!
@NeoInTheMatrix680
@NeoInTheMatrix680 Год назад
How does queuejumper actually work 😢 everyone says its trivial but how to perform it pls make a video on it.
@apIthletIcc
@apIthletIcc Год назад
I'm in need of an eml file reader/editor that isn't buggy right now. If anyone knows of one. Friend of mine has a stalker and I can't help them block the person's access as it was crafted eml files that when read get added to a compile pipeline on the devices in question. I need a native eml reader with a strong sandbox but one I can redact sensitive user's info in before sharing them, for their privacy. This is a pretty big problem and the hackers will likely see this, I currently can't even use my pc's (all busted by the hacks) for analysis, and discontinuing use of this account tomorrow because it may be compromised. But will be back to check on this comment.💤
@drmikeyg
@drmikeyg Год назад
Only 97 vulns? Thanks Tim
@prophead62
@prophead62 Год назад
this is a great representation of WHAT this thing is ....well done! NOW ....how the hell do you get rid of it ?????!!!!!
@Trent_Walter
@Trent_Walter Год назад
Thanks for your video, you should do another one continuing on from what you do with the DC machine hash to compromise the domain. Cheers
@jfkastner
@jfkastner Год назад
Interesting, thank you