Tweetovi

Blokirali ste korisnika/cu @DefConUA

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @DefConUA

  1. proslijedio/la je Tweet
    10. ruj 2018.

    1st place for our team at CTF 2018. Great job from with hard and interesting challenges. Congrats to all teams for their effort!

    Poništi
  2. 10. ruj 2018.

    HackIT CTF 2018 is over, congratz greunion for 1st, TokyoWesterns 2nd and 3rd places!

    Poništi
  3. proslijedio/la je Tweet
    8. ruj 2018.

    After 12 hours, CTF Scorecard stands as following with 'Billy' leading the fray with 3993 points followed by 'KerKerYuan' and 'TokyoWesterns'. 36 more hours to go

    Poništi
  4. 7. ruj 2018.

    We are organizing HackIT CTF 2018, Sep.8 8:00-Sep.10 8:00 (UTC). Please join

    Poništi
  5. proslijedio/la je Tweet
    20. lip 2016.
    Odgovor korisniku/ci

    Use to check for firmware vulnerabilities. This vuln can be checked via common.uefi.s3bootscript:

    Poništi
  6. proslijedio/la je Tweet
    14. lip 2016.

    Extracting NTLM creds from secure VM in Win10 VSM/Credential Guard via FW vuln (see ~31m30s)

    Poništi
  7. 28. tra 2016.

    Check - dcua at the first place in 2016.wow.awesome congratz dcua, you rock. keep it up. thanks and othr

    Poništi
  8. proslijedio/la je Tweet
    28. tra 2016.

    Finally ATR website updated: with all presentations/papers. Check it out. Special thanks and John Loucaides

    Poništi
  9. proslijedio/la je Tweet
    6. lis 2014.

    More details about “BERserk” RSA Signature Forgery vulnerability in Mozilla NSS with forging algorithm and CA example:

    Poništi
  10. proslijedio/la je Tweet
    30. ruj 2014.

    Part one of our technical analysis of the “BERserk” RSA Signature Forgery vulnerability in Mozilla NSS: //

    Poništi
  11. proslijedio/la je Tweet
    24. ruj 2014.

    The Advanced Threat Research team at Intel Security found critical vulnerability in NSS: RSA Signature Forgery:

    Poništi
  12. proslijedio/la je Tweet
    10. lip 2014.

    Good tool for parsing BIOS/UEFI firmware images:Volumes,FS,Files,UEFI variables: (chipsec_util decode spi.bin type)

    Poništi
  13. proslijedio/la je Tweet
    28. svi 2014.

    Congratz to and for winning CONFidence 2014 DS CTF!

    Poništi
  14. proslijedio/la je Tweet
    23. sij 2014.

    Must say great thank to , and for advices, hints and share experiences when we building hashcrack server.

    Poništi
  15. proslijedio/la je Tweet
    30. pro 2013.
    Odgovor korisniku/ci

    "Young padawans trained a lot and got #5 on in 2013 year ( ). Congratz!"

    Poništi
  16. proslijedio/la je Tweet
    20. lis 2013.

    Hmm, the same MITM technique on iOS from at already disclosed year ago at by

    Poništi
  17. proslijedio/la je Tweet
    20. lis 2013.

    warl0ck gam3z is officially over, congrats to dcua, zorro1 and null for the first 3 places

    Poništi
  18. proslijedio/la je Tweet
    20. lis 2013.

    congrats to player dcua for completing the warl0ck gam3z challenge in 37 hours and 1 minute

    Poništi
  19. proslijedio/la je Tweet
    13. ruj 2013.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·