Christian

@CheariX

Security Researcher . Topics: Single Sign-On, Web Services, Document Formats, Secure Instant Messaging. Co-founder of (Private Account)

Vrijeme pridruživanja: siječanj 2014.

Tweetovi

Blokirali ste korisnika/cu @CheariX

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CheariX

  1. proslijedio/la je Tweet
    10. sij

    The ticket sale for 2020 has officially started! Get your early bird ticket with a limited discount now or choose the full package including one of our in-depth trainings 👉

    Get your RuhrSec Ticket now!
    Poništi
  2. proslijedio/la je Tweet
    22. pro 2019.

    TIL: Even though there is no "view source" option in Safari on iOS, you can still inspect the HTML source of webpages. All you need to do, is to craft a Bookmark containing JavaScript Code (with javascript: Scheme). The code/link fit's in a Tweet:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    17. pro 2019.

    "Restricting the scripts, you're to blame, you give CSP a bad name" by and is the first talk added to the program for 2020

    RuhrSec Speaker Ben Stock and Sebastian Roth
    Poništi
  4. proslijedio/la je Tweet
    16. pro 2019.

    We are finally able to unveil the first for 2020: Prof. Tim Güneysu will give one of the !

    RuhrSec 2020 Keynote Speaker Prof. Tim Güneysu
    Poništi
  5. proslijedio/la je Tweet
    13. pro 2019.

    Congratulations to our IT security consultant and more importantly friend Karsten Meyer zu Selhausen. He has won the Eurobits Excellence Award due to his outstanding master thesis about breaking PDF signatures. Congratulations. 🎉🥇

    Award ceremony
    Lightning talk
    Poništi
  6. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    26. stu 2019.

    Warum "verschlüsselt und signiert" nicht zwangsläufig auch "vertraulich und authentisch" bedeutet, zeigen uns , und in ihrem Talk "How to break PDF security" auf dem German OWASP Day! Infos und Tickets unter "

    Poništi
  8. 15. stu 2019.
    Poništi
  9. proslijedio/la je Tweet
    13. stu 2019.

    We have now also updated our TLS-Attacker Burp Suite extension based on the new stuff introduced in TLS-Scanner. Enjoy:

    Poništi
  10. 12. stu 2019.

    I'm pretty sure that will upload the recordings after the conference

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    explaining how to spoof PDF signatures at

    Prikaži ovu nit
    Poništi
  12. 12. stu 2019.

    Do you want to learn how to break PDF security? Come to the PDF Attack session in Kings Balmoral I'll give the talk at 11am on breaking PDF signature followed by 's talk on breaking PDF encryption. /cc

    Poništi
  13. proslijedio/la je Tweet
    8. stu 2019.

    Im Workshop mit werden auf UI-Redressing basierende Grundlagen, Angriffe & Gegenmaßnahmen detailliert analysiert. Darüber hinaus werden neben bekannten Angriffen mitunter Forschungsergebnisse aus bspw. Fallstudien über neue UI-Redressing-Angriffe erörtert.

    Poništi
  14. proslijedio/la je Tweet
    7. stu 2019.

    The preparations for RuhrSec 2020 are slowly starting and it is amazing to see how this event has evolved over the last five years. For example, we will have child care and scholarships for minorities in the next year.

    Poništi
  15. proslijedio/la je Tweet
    7. stu 2019.

    We released a new version of our tools TLS-Attacker and TLS-Scanner. Besides various improvements TLS-Scanner now has a rating & recommendation system. Feedback on how we rate things is more than welcome.

    Poništi
  16. proslijedio/la je Tweet
    7. stu 2019.

    After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: (CVE-2019-3465) // cc

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    22. lis 2019.

    Imagine you could shut down almost any website on the web. A serious bug in CDNs like and made it possible - only one HTTP request needed. Check out the CPDoS attack discovered by my colleagues: (to appear )

    Prikaži ovu nit
    Poništi
  18. 30. lis 2019.

    Hey , Thanks for reducing your trackers from 9 down to 6 in your latest version! I still hope you can go down to 2-3 trackers as it was one year ago. Any chance?

    Prikaži ovu nit
    Poništi
  19. 4. lis 2019.

    Hey , why did you add so many trackers in recent versions? Any plans to reduce then in future versions? /cc

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    2. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·