𝐂𝐮𝐫𝐭𝐢𝐬 𝐁𝐫𝐚𝐳𝐳𝐞𝐥𝐥

@CurtBraz

Author by day, hacker by night? Dabbled/fumbled in most areas of for a while now. Tweets are mine! Log Long & Parameterize 🖖

Indianapolis, IN
Vrijeme pridruživanja: listopad 2011.

Tweetovi

Blokirali ste korisnika/cu @CurtBraz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CurtBraz

  1. Prikvačeni tweet

    Great news, everyone!! Due to demand, I decided to place another order of "M is for Malware" prints, available in March. This time I'm willing to ship anywhere in the world and will be selling exclusively on . Reserve a copy and tell your friends, please!

    Prikaži ovu nit
    Poništi
  2. New Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root via

    Poništi
  3. Did some massive bug hunting tonight. New release out.

    Poništi
  4. Poništi
  5. You get that cluster of green numbers, evil hacker person. No Cybersecurity stock image better represents what I do every day.

    Poništi
  6. Poništi
  7. Seriously though , , and . Will you please consider this extra precaution to protect your users? I'm one of them. is everyone's responsibility.

    Poništi
  8. 3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  9. That's, "leveraging" for 1,000, Alex.

    Prikaži ovu nit
    Poništi
  10. 3. velj

    What a pleasant surprise from ⁦⁩! Thank youuuuu! Also thanks to ⁦⁩ for such an awesome book 😁

    Poništi
  11. After going grey from reading about Disney+ and all of these other "breaches" (Credential Stuffing attacks) I wanted to write about levering the HIBP Pwned Passwords API to protect users proactively. A simple solution to a BIG problem IMO!

    Prikaži ovu nit
    Poništi
  12. Poništi
  13. 31. sij

    My interview w/ two penetration testers who were arrested and criminally charged last September in Iowa for doing what they were hired to do: Test the security of courthouses in Iowa. The charges were finally dropped on Thursday (during this interview).

    Poništi
  14. The new campaign uses HTML redirectors attached to emails. When opened, the HTML leads to the download Dudear, a malicious macro-laden Excel file that drops the payload. In contrast, past Dudear email campaigns carried the malware as attachment or used malicious URLs.

    Prikaži ovu nit
    Poništi
  15. Poništi
  16. Phishing Tip: Most people know that the old technique of masking a hyperlink is no longer practical because it'll get caught in spam filters. However, I noticed if you have an opportunity to replace a "g" with a "q" in your domain it looks similar when linked (underlined). 🤷‍♂️

    Poništi
  17. This is great news! Never should have gone to court in the first place. From Discover on Google

    Poništi
  18. Oh. Heck. Yes. Although it's MS so it's probably just going to be another "feature".

    Poništi
  19. 28. sij

    tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.

    Poništi
  20. Now we're just picking on Zoom, lol. I noticed this myself in the past but figured that's why people use passwords in addition to their meeting IDs. The ID isn't meant to be a password. Zoom vulnerability would have allowed hackers to eavesdrop on calls

    Poništi
  21. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·