Adel

@0x4D31

Security Engineer, Hunting badness . Views are my own, not my employer's!

Virgo Cluster
Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @0x4D31

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x4D31

  1. Prikvačeni tweet
    28. srp 2019.
    Poništi
  2. 2. velj
    Prikaži ovu nit
    Poništi
  3. 2. velj
    Prikaži ovu nit
    Poništi
  4. 2. velj
    Prikaži ovu nit
    Poništi
  5. 1. velj

    Just came across ’s great blog and really enjoyed reading one of his posts on long short-term memory (LSTM): Made me intereted in learning more about .

    Poništi
  6. 27. sij

    Nice research! The technique itself (using the HTTP headers and order of the headers for fingerprinting) is not novel as claimed in the paper though! It’s been known for many years.. even before this patent:

    Poništi
  7. 27. sij
    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. proslijedio/la je Tweet

    We've published the file with decrypted traffic from our live demo at . The capture file contains traffic, Google searches, a submission and a user logging in and posting to Twitter.

    Poništi
  10. 13. sij

    Been enjoying this amazing album from Hessless -an unknown Persian alternative/progressive band- for years! Feel like living it again these days!

    Poništi
  11. proslijedio/la je Tweet
    24. pro 2019.

    A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    And if you're interested in how some of these new password features work under the hood, check out Proud of the work we're doing to protect users from the many shortcomings of passwords. 🦺🔑

    Poništi
  14. proslijedio/la je Tweet
    6. pro 2019.

    . researchers, and I, had a look at the recent auth bypass vuln affecting OpenBSD. Detection prototype available here

    Poništi
  15. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  16. 3. pro 2019.

    Hadn’t caught up with twitter for a few days and now there are discussions about tooling everywhere..! 🤔

    Poništi
  17. 28. stu 2019.
    Poništi
  18. proslijedio/la je Tweet

    Blog post about the work Google's Threat Analysis Group (TAG) does. Targeted phishing stats, Sandworm campaign details and disinfo campaign takedowns. We plan to do more of these.

    Poništi
  19. proslijedio/la je Tweet

    TAG revealing more information on Sandworm attacks we saw (and countered). Good work and

    Poništi
  20. proslijedio/la je Tweet
    19. stu 2019.

    ICYMI here are a couple of malware families and utilities that use DNS-over-HTTPS (DoH) - GODLUA - PSIXBOT - Many Rocke Group things LUA -> PE/ELF - MineGo? cc - CHEWESCHEW (more soon) - GoDoH - DoHC2 - Speedify ("legit"?) - (~ 300 repos)

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    19. stu 2019.

    Do you have SSH in your environment? I'm kidding. Of course you do. customers can now gain forensic insights into their SSH traffic. Here's how:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·