Tweetovi

Blokirali ste korisnika/cu @Dotvn1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dotvn1

  1. proslijedio/la je Tweet
    4. sij

    Another (never shared and) remarkable thing is that SenseNets was experimenting/doing something with network cameras which showed live views of (de)construction sites [locations unknown]. We never could find any connection besides the fact that the IPs were in the MySQL database.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. lip 2019.

    Someone decided it was a good idea to release an automated tool for pwning Android devices via ADB. This is not going to end well. I have a funny feeling that lots of advertising displays and smart TVs will load PornHub videos in the coming months.

    Poništi
  3. proslijedio/la je Tweet
    23. svi 2019.
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. svi 2019.

    THE CAR HACKER’S HANDBOOK | A Guide for the Penetration Tester

    Poništi
  5. proslijedio/la je Tweet

    Today is the big day! Kali 2019.2 release! Ready for download at This release has MAJOR NetHunter updates, 13 new images and new device support. Thanks to the NetHunter team for pushing this forward and for leading this effort.

    Poništi
  6. proslijedio/la je Tweet

    Cool tech, but I fear that soon we’ll be walking ad campaigns on our clothing.

    Poništi
  7. proslijedio/la je Tweet
    16. svi 2019.

    ATTENTION: I finally decide to share with all of you my last publication presented in y . This new guide is called "The hacker's hardware toolkit" and I am fully sure you'll love it!

    Poništi
  8. proslijedio/la je Tweet
    14. svi 2019.

    Unifying toy demo (for non public talk tommorow). Attacker has ONE-TIME-ACCESS to encrypted Logitech keyboard, to press arbitrary keys.Remote machine listens on RF, breaks crypto, injects client agent via keystrokes, which then relays a shell over the unmodified Unifying dongle

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    14. svi 2019.

    For all your phishing 🎣 and post-phishing 🍣 automation needs, and me just released Muraena (yet another reverse proxy) and NecroBrowser (necrocontrol): Slides from our talk at HITB AMS here: 🎣🐟🦆 Happy Phishing 🐟🦆🍣

    Poništi
  10. proslijedio/la je Tweet
    14. svi 2019.

    Some deep refactorization was done! Upcoming hashcat will support (simultaneous) use of CUDA and OpenCL. This enables hashcat to run on systems using ARM architecture based CPUs. For instance, NVIDIA Jetson or IBM POWER9. Beta is available.

    Poništi
  11. proslijedio/la je Tweet
    13. svi 2019.

    LOGITacker next demo: eavesdropping an encrypted Logitech wireless keyboard with hardware worth 10USD ... no additional software, just a terminal communicating with a provided USB serial port

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    will soon include a custom-built full kernel in to underpin its newest version of the Windows Subsystem for Linux version 2.0 (WSL 2) —by

    Poništi
  13. proslijedio/la je Tweet
    5. svi 2019.

    Evil Clippy: our new tool for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse many macro security analysis tools. Read our blog post for details:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. svi 2019.

    “An intro to pentesting an Android phone” by Thao N. Vo

    Poništi
  15. proslijedio/la je Tweet
    29. tra 2019.
    Poništi
  16. proslijedio/la je Tweet
    29. tra 2019.

    Dahua Security Camera Backdoor Checker and The Story Behind It

    Poništi
  17. proslijedio/la je Tweet
    27. tra 2019.

    “How to bypass a 2FA with a HTTP header” by Yumi

    Poništi
  18. proslijedio/la je Tweet
    28. tra 2019.

    How to build a passive IMSI catcher

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2018.

    Thanks to osmocombb and the whole osmocom GSM network stack components I was able to build my own GSM phone for a challenge. Any similarity with previous commercial phones is a pure coincidence. If you want to hack this thing, check out newphonewhodis and identitytheft.

    Poništi
  20. proslijedio/la je Tweet
    26. tra 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·