Loïc Castel

@Dick_Reverse

Lead pentester @ SSL247. Crazy about IoT and ICS security, bug finding (fuzzing, code review) and exploiting.

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @Dick_Reverse

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dick_Reverse

  1. proslijedio/la je Tweet
    30. sij

    [THREAD] Je vous ai déjà parlé de la Cité Emmurée de Kowloon, le ghetto dystopique cyberpunk Hong-Kongais impénétrable des années 80 ?

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Bien joué à notre team ! 4ème au challenge CDAISI du FIC 😁 On enchaîne avec le gg

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Coming to ? Do you perform on-site security evaluations for your clients? Come find me for a free gift... this little orange card, isn't just an orange card. It's a tiny envelope for you to keep your authorization letter while on premises. 😉

    small orange "Get Out of Jail Free" card
    the orange "card" is actually a small orange envelope
    Poništi
  5. proslijedio/la je Tweet

    wow i just learned a thing about metasploit by accident that I wish I could go back and teach myself like ten years ago. i could have saved myself a collective year of typing and tab completion.

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Merci à tous et notamment à nos speakers pour cette édition de la ! On se retrouve le lundi 24 du mois prochain ! Bonne soirée à tous et bon / 😎

    Poništi
  7. proslijedio/la je Tweet
    27. sij
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Demain, le FIC ouvrira ses portes à Lille Grand Palais. N'hésitez pas à venir nous rencontrer sur notre stand où vous pourrez poser toutes vos questions mais aussi assister aux présentations animées par nos experts en PKI ainsi que nos experts en test d'intrusion.

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    An extra lecture is planned for tonight! Thus, will talk about internal CTF organization (more information on ) As we now have three talks, we've made a planning 😉

    Poništi
  10. proslijedio/la je Tweet

    I've a hunch that SIM swap attacks are more prevalent than we are being told. For a number of reasons mostly

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Also I'd like to see a DSCP, or Defensive Security Certified Professional. The exam is you have 24h to set up a defensive infra (with limits, like in the real word!) and then not get pwned within another 24, or get pwned and do IR.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    25. sij

    Bon je vois que vous êtes tous en panique face au virus, et ça installe une psychose malsaine donc remettons un peu les choses à leur place ⬇️

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    25. sij

    What would be the first 3 things you'd do if a company hires you to help them improve their security? These are mine, what about yours? 1) Asset management 2) Offsite backups for all assets (disaster recovery) 3) 2FA wherever possible

    Poništi
  14. proslijedio/la je Tweet
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Lundi soir prochain nous parlerons de la protection des réseaux automobiles avec , puis présentera un talk sur l’utilisation du cloud comme infrastructure d’hébergement de malwares ! Pour plus d’infos :

    Poništi
  16. proslijedio/la je Tweet
    13. sij

    [New Post] Backdoor Schneider M340 PLC using -like attack based on DLL-Reflective. Deep dive from Grafcet/Ladder processing to assembly. Inject your own C payload into PLC to perform funny things like TCP port scanner, lateral movement...

    Poništi
  17. proslijedio/la je Tweet
    10. sij

    Come and join us on the 28th, 29th and 30th January 2020 at Lille Grand Palais and meet our award-winning cybersecurity consultants, certified PKI experts, and CREST-accredited Penetration Testers. Read our blog:

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    cc we'll have some folks comin from Paris for your next meetup! ;)

    Poništi
  19. 8. sij
    Poništi
  20. proslijedio/la je Tweet
    7. sij

    CVE-2019-19781 : Vulnerability in Citrix Application Delivery Controller and Citrix Gateway leading to arbitrary code execution VPN gateways Look for uri-path: - '*/../vpns/*' - '*/vpns/cfg/smb.conf'

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·