Chackal

@Chackal__

Pentester - Bug Hunter on - CTF player w/ -Personnal Blog here : 🇨🇮

Limoges, France
Vrijeme pridruživanja: ožujak 2018.

Tweetovi

Blokirali ste korisnika/cu @Chackal__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Chackal__

  1. Prikvačeni tweet
    20. lip 2019.

    I just pwned the Barbie’s connected house! Awesome challenge by at .

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Bonjour Twitter, je suis malgache et nous avons créé une école de CyberDefense dans 7 Pays d'Afrique, je souhaite que nous rejoigne. Le Gabon nous a rejoints ce matin. Contactez moi par message.

    , , i još njih 6
    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. 31. sij
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Volatility plugin that retrieves the Full Volume Encryption Key (FVEK) in memory. The FVEK can then be used with Dislocker to decrypt the volume. Works on every 64-bit Windows version from Windows 7 to Windows 10 and is fully compatible with Dislocker.

    Poništi
  6. proslijedio/la je Tweet

    Hello, nous organisons également en plus de Paris non pas 1 mais 2 autres meet-ups ouverts à tous à Rennes et Toulouse, voici les informations des différents meets : - Toulouse: - Paris: - Rennes:

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    This is a great effort to get more people into RE :

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Vous pouvez trouver les sources du by avec les writeups et les scripts de solve pour chacun des challenges à l’adresse suivante 😊 La Ruche by

    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Nous recherchons un stagiaire pour intégrer notre équipe rendu. L'intégration de sondes de reflection dans le moteur sera le sujet de ce stage. , une équipe jeune et dynamique, un projet de grande ampleur !

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    Here is my Infosec Useful Stuff personal list: I will add more tools and resources later (english and public resources only)

    Poništi
  12. 23. sij

    Every red-teamer should check this out!

    Poništi
  13. proslijedio/la je Tweet
    22. sij

    BREAKING - To help organizations identify compromised systems with CVE-2019-19781, & have released a tool that searches for indicators of compromise associated with attacker activity observed by

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Day Two begins with a successful demonstration. and were able to demonstrate RCE against the Inductive Automation Ignition. They're off to the disclosure room for details and verification.

    Poništi
  15. proslijedio/la je Tweet
    21. sij
    Poništi
  16. proslijedio/la je Tweet

    Confirmed! and used 2 bugs to get a remote shell (at System!) on the web server. They earned $25K and 25 Master of Pwn points in the process. Great work.

    Poništi
  17. proslijedio/la je Tweet

    Confirmed! , , and from the Horst Goertz Institute for IT-Security () used an OOB access to gain code execution on the Rockwell Automation HMI. They earned themselves $25,000 and 25 points toward Master of Pwn.

    Poništi
  18. proslijedio/la je Tweet

    Confirmed! of used a OOB Access bug to get RCE (w/ continutation) against Iconics Genesis64 in the Control Server category. There's spectacular research earns them $25,000 and 25 more Master of Pwn points.

    Poništi
  19. proslijedio/la je Tweet

    The schedule for Day One of Miami is posted! We'll be updating this blog throughout the day with results and updates. Be sure to check it out often.

    Poništi
  20. 19. sij

    No more excuses to not step up this year! 2020 goals: > Really get into binaries hacking (RE/Pwn) > Reach the top 10 on > Get more skills on AD attacks and defense. > Write more blog posts M. > Meet more people and have fun at CTFs and conferences.

    Poništi
  21. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·