netcat

@0xBADCA7

Cato the Fako of Information Security. CTFing with LC↯BC, MSLC. Managing cyberz by day, pwning stuff by night. Cogito, ergo sum, ergo pwn.

Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @0xBADCA7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xBADCA7

  1. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Poništi
  3. proslijedio/la je Tweet
    29. sij
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    14. sij

    We now have a way to play with target java objects from FridaAndroidInjector. The agent will load a dex with the java interfaces you've coded. Checkout the example in the repo:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. sij
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Windows Kernel Information Disclosure Vulnerability , PoC for the SWAPGS attack (CVE-2019-1125)

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  11. proslijedio/la je Tweet
    24. sij
    Poništi
  12. proslijedio/la je Tweet
    26. sij
    Poništi
  13. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    HTTP Request Smuggler now supports overriding the request method! spotted that using an alternative method like DELETE can sometimes let you exploit otherwise-secure targets. (If you accidentally delete someone's homepage, that's on your head!)

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    CVE-2020-0609 & CVE-2020-0610 Before / After patch Pseudo-code

    Poništi
  17. proslijedio/la je Tweet

    tl;dr: if you live in california, it is now illegal for an org to hire you as an infosec consultant to help on a gig for a week or two. youll have to LLC up and do it b2b to comply with this law. thanks, asshats. you broke the infosec consulting market in california.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    18. sij

    A little more than 15 hours remaining ! Current leaders: 1 - More Smoked Leet Chicken 2 - 0daysober 3 - perfect blue

    Poništi
  19. proslijedio/la je Tweet
    18. sij

    Congratz to More Smoked Leet Chicken for solving all the challenges of this year’s CTF TEASER!

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    How to determine the cost of an attack objectively? One possibility is to follow the methodology proposed by the JHAS group, namely the Application of Attack Potential to Smartcards and Similar Devices. Read more and access the tool we created on our blog:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·