![Day[0] cover image](https://wsrv.nl/?url=https%3A%2F%2Fd3t3ozftmdmh3i.cloudfront.net%2Fproduction%2Fpodcast_uploaded_nologo%2F1589585%2F1589585-1553556841291-2e3a293ad9c2e.jpg&w=320&h=320)
Binary Ninja's Decompiler, git credential leak, cross-platform LPEs
Day[0]
00:00
A Man Does Have an Impact
Even google have been sued based on jeypiar, or fined, i should say, not sued, but find based on them. There is definitely few things like colbalt strike, some of the stuff that like pentesters use. They'll go in like compromise all kinds of other servers and active directory to get as much access as they can. Usually if you have really a good set up, you can maybe catch this in the early stages. But unfortunately, it doesn't seem to matter nce the moerye. In general, there's just trust, trust everybody that's kind of inside the perimiter.
Play episode from 11:33
Transcript


