or through their positions being more secure as newcomers will have a harder time learning about security. Offensive tooling is used multiple ways. From traditional red teaming and penetration testing, to blue teams evaluating defenses on their own because 2/9
-
-
Prikaži ovu nit
-
they cannot afford a red team. Students – who may lack the ability to run tools like Metasploit and understand how real-world attacks happen, may therefore struggle to gain practical experience for their first jobs. 3/9
Prikaži ovu nit -
The fight against open source and other offensive tooling is a call to restrict knowledge on the false premise that you can limit its propagation, therefore restricting the ability for security professionals to test their defenses and 4/9
Prikaži ovu nit -
calling it a win because script kiddies will lose access to tools which should be caught without modification by any modern AV or EDR. 5/9
Prikaži ovu nit -
They are effectively trying to seize the entire iOS security market by arguing that because the Corellium tool can be used maliciously, it should be illegal – regardless of any other valid use case. 7/9
Prikaži ovu nit -
This kind of 3rd order maliciousness is a shortsighted attack against all of security as they argue that if researchers do not turn over all their research for free, then they are not operating in good faith and should be stopped. 8/9
Prikaži ovu nit -
Similarly broad regulation on offensive tools will be wielded against the entire security industry, meaning commonly used and versatile tools like Netcat being caught up in the mix as well. 9/9
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
great thread man
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.