Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @DeLusional_Sec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @DeLusional_Sec
-
Justin proslijedio/la je Tweet
A little over a year ago, I was 6 months into job hunting, probably around 300 applications deep, with only 3 interviews that were all "no's". I applied to an open position at
@nisos as a joke, wanting the position but knowing I had little "on paper" that would even warrant (1/x)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
It’s not the requirements. It’s the fact that they added the “brain f*** programming language”

Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
That’s why it said “no. Not really” haha.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Justin proslijedio/la je Tweet
#sharingtheknowledge
#infosec#ctf#learning “Capture What Flag?” by JenF3rr_https://link.medium.com/nkl0KEMMP3Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
CVE-2019-18426
#WhatsApp for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details: https://thehackernews.com/2020/02/hack-whatsapp-web.html …#infosecpic.twitter.com/mPLBAErVGK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs
could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same.
Details: https://thehackernews.com/2020/02/philips-smart-light-bulb-hacking.html …pic.twitter.com/dEQMookZNR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
My new blog is up! This discussses the basics of passwords and dangers of password reuse and weak passwords. Geared in a fashion that anyone can understand. I’m hoping that this can shared with families without jargon.https://delujsecurity.com/password-hygiene-and-attacks/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hey all! I have a new blog being posted tomorrow at 8am EST. This will discuss password reuse, hygiene, and mitigation. This is just focused on basic password understanding that hopefully you can share with family members about passwords
I’ll post here tomorrow with the link!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
To the person who figured out my honeypot is a honeypot could you please stop putting the picture of Pooh bear with a jar of honey on it? Its like this person's life mission, I've blocked him on: - Client - IPs (now on Tor ffs) - The image (he just edits 1 pixel every time...)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
Whelp it wasn’t DNS Taking the Lhttps://twitter.com/bdsams/status/1224360680213680129 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Also, what a great way to meet new people in the field! this was my first time talking to a lot of people on the team
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And of course
@roketscientist idk why I have such a hard time finding your name
! Thank you everyone for your contribution and time put in!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Whelp. The MSF CTF is over! Wow. What a difficult CTF but I learned a ton!
@metasploit thanks for the fun! We ended up in 32nd place thanks to my amazing team!@_mbanana@voldemortensen@_glitchXR@NO53LF@O0Wh0@Axe_Assassin@juxtapositionsi@JenF3rr_ and@S1B3RPR0Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I want to start collecting these patches.
@deadpixelsec , be my first please!
https://twitter.com/fizzystar_/status/1223773858563547137 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Justin proslijedio/la je Tweet
We can definitely all learn... This was tough CTF! We had shells on systems without getting flags and flags we couldn't decrypt
still atop 50 finish thoughHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And of course
@_mbananaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
