en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

259
active users

#WindowsSecurity

0 posts0 participants0 posts today
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Mimikatz is a well-known open-source tool for extracting credentials from Windows systems. It can retrieve plaintext passwords, hash credentials, and even Kerberos tickets from memory. Used by both researchers and attackers, it highlights the importance of secure credential management in Active Directory environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/gentilkiwi/mimikatz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/gentilkiwi/mimikatz</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
passbolt<p>Looking to secure your passbolt instance with an SSL certificate on Windows?<br> <br>From self-signed certificates for testing to trusted CA certificates for production, this guide walks you through the step-by-step process to generate, configure, and install SSL certificates for passbolt on Windows.</p><p>🔗 Read the full guide: <a href="https://hubs.li/Q037YnB20" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">hubs.li/Q037YnB20</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/Passbolt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Passbolt</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mastodon.social/tags/PasswordManagement" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordManagement</span></a> <a href="https://mastodon.social/tags/SSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSL</span></a> <a href="https://mastodon.social/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p>
nemo™ 🇺🇦<p>Akamai's latest discovery reveals a devious malware technique that hijacks Windows' UI Automation feature to evade detection! This malicious method can execute commands stealthily, making it hard for antivirus programs to catch. 🦠💻 Admins are urged to monitor suspicious activity involving UIAutomationCore.dll. Stay alert! 🔍 <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newz</span></a> <a href="https://mas.to/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://www.techradar.com/pro/security/this-devious-new-malware-technique-looks-to-hijack-windows-itself-to-avoid-detection" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">techradar.com/pro/security/thi</span><span class="invisible">s-devious-new-malware-technique-looks-to-hijack-windows-itself-to-avoid-detection</span></a></p>
Frits van der Holst<p>Windows: Insecure by design • The Register<br><a href="https://mastodon.nl/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.nl/tags/windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows11</span></a> <a href="https://mastodon.nl/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://mastodon.nl/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.nl/tags/oss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oss</span></a><br><a href="https://www.theregister.com/2024/06/28/windows_insecure_by_design/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2024/06/28/win</span><span class="invisible">dows_insecure_by_design/</span></a></p>
JoanBCatWoman<p><span class="h-card" translate="no"><a href="https://social.treehouse.systems/@megmac" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>megmac</span></a></span> We're already there! I graduated (Computer Science) in 1981 and worked when systems were designed (by Systems Analysts), tested (properly) and QA existed. I deplore multi-nationals employing ill-trained, inexperienced IT staff and shoving buggy systems out to consumers. Windows is a prime example as is Horizon <a href="https://mastodon.scot/tags/PostOfficeScandal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PostOfficeScandal</span></a> <a href="https://mastodon.scot/tags/windowssecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowssecurity</span></a>.</p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"⚠️ Windows SmartScreen Bypass Alert: CVE-2024-21351 Unveiled 🔓"</p><p>A new vulnerability, CVE-2024-21351, exposes a security feature bypass in Windows SmartScreen, enabling attackers to execute arbitrary code by tricking users into opening a malicious file. This flaw, with a CVSS score of 7.6, follows the previously patched CVE-2023-36025, indicating a method to circumvent Microsoft's efforts in securing its SmartScreen feature. Attackers exploit this vulnerability actively in the wild, despite Microsoft's release of an official fix. </p><p>Technical breakdown: CVE-2024-21351 allows code injection into SmartScreen, bypassing protections and potentially leading to data exposure or system unavailability. Cybersecurity professionals must understand the attack vector, which requires social engineering to convince a user to open a malicious file.</p><p>Tags: <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a> <a href="https://infosec.exchange/tags/CVE2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE2024</span></a>-21351 <a href="https://infosec.exchange/tags/SmartScreenBypass" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SmartScreenBypass</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/PatchNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PatchNow</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> 🛡️💻🔧</p><p>Mitre CVE Summary: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21351" rel="nofollow noopener noreferrer" target="_blank">CVE-2024-21351</a></p>
Sass, David<p>Does anyone know how can I remove this <strong>passkey</strong> nonsense from my <a href="https://infosec.exchange/tags/Windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows</span></a> Security window? </p><p>I don't want to use <a href="https://infosec.exchange/tags/passkeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passkeys</span></a>, I just want to start typing the PIN of my yubikey without needing TWO extra clicks every time. </p><p><a href="https://infosec.exchange/tags/Windows11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Windows11</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p>
Najam Ul Saqib :verified:<p>A blog post on my experience about how I hacked into an active directory environment of an enterprise.</p><p><a href="https://njmulsqb.github.io/2023/09/23/The-Blitzkrieg-Effect-Infiltrating-an-Enterprise-Active-Directory-Environment.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">njmulsqb.github.io/2023/09/23/</span><span class="invisible">The-Blitzkrieg-Effect-Infiltrating-an-Enterprise-Active-Directory-Environment.html</span></a></p><p><a href="https://infosec.exchange/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://infosec.exchange/tags/WindowsSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsSecurity</span></a></p>