Tweetovi

Blokirali ste korisnika/cu @EOSkyfail

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EOSkyfail

  1. proslijedio/la je Tweet
    7. pro 2019.

    Cyber scared straight: NCA: Ok kids, I'm going to show you what a life of cyber crime is really like. *Lambos* *R8 drifting on Moscow streets* *Stacks of cash* NCA: Well I hope we've learned our lesson today. Kids: yep

    Poništi
  2. proslijedio/la je Tweet
    19. lis 2019.

    Just published my latest project "ByePg", exposing an entirely new attack surface to PatchGuard/NT and bringing 's InfinityHook back:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    19. lis 2019.

    First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem"

    Prikaži ovu nit
    Poništi
  4. 12. ruj 2019.

    A bit disappointed about the actual challenge tho, it's more about guessing than security flaws

    Prikaži ovu nit
    Poništi
  5. 12. ruj 2019.

    . is it on purpose that you could just download the entire python app for the "Ouch, my backup!" challenge?

    Prikaži ovu nit
    Poništi
  6. 12. srp 2019.
    Poništi
  7. proslijedio/la je Tweet
    19. lip 2019.

    i didn't choose the bug life

    Poništi
  8. proslijedio/la je Tweet
    7. lip 2019.

    Software security

    Poništi
  9. proslijedio/la je Tweet
    14. svi 2019.

    Intel MDS vulnerabilities show modern multi-tenant many-core hyper-threaded processor architecture is largely pointless

    Poništi
  10. proslijedio/la je Tweet
    6. tra 2019.

    BREAKING NEWS: 𝐎𝐇 𝐆𝐎𝐃 𝐓𝐇𝐄𝐘 𝐀𝐂𝐓𝐔𝐀𝐋𝐋𝐘 𝐃𝐈𝐃 𝐈𝐓 Attn:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    The 5 eyes spy cloud is a post-mortem database. Analysts can time-travel in the data of any person of interest. They have everything about the Christchurch shooter, his comms, locations and connections. Yet mountains of spy data from mass surveillance can’t prevent such attacks.

    Poništi
  12. proslijedio/la je Tweet
    23. velj 2019.
    Tweet je nedostupan.
    Poništi
  13. proslijedio/la je Tweet
    22. sij 2019.

    So I wanted to encrypt some files. Thought about using 7z+password. Stackexchange folks said "Didn't review it but it should be fine. You can browse the code yourself". So I did. After a few mins I noticed they use 8byte "random" IV. Yes, half of IV is zeroes. But it gets worse.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    11. sij 2019.

    The enterprise sandbox malware analyzing appliance of your victim is licensed to analyze 1,5k samples per day? Send him 1500 different bullshit files and then one with your malware :)

    Poništi
  15. 11. sij 2019.

    "If the content is not removed within time, we may, as allowed by law, have to carry out DDoS-Attacks against the backend servers [...] Mit freundlichen Grüßen / Best Regards Jan Schürlein" Muss man solchen Leuten wirklich noch Aufmerksamkeit schenken?

    Poništi
  16. proslijedio/la je Tweet
    19. lis 2018.

    Had to been done ur welcome

    Poništi
  17. proslijedio/la je Tweet
    18. lis 2018.

    Nginx off-by-slash vulnerability, cool trick presented by at

    Poništi
  18. 4. kol 2018.

    Hey will BO4 use Warden Anti Cheat or improved screenshot taking TAC?

    Poništi
  19. proslijedio/la je Tweet

    Having encrypted DNS enables so many cool things online. For example, we have a new proposal for encrypting SNI that we'll be talking about at . Here's the draft:

    Poništi
  20. proslijedio/la je Tweet
    2. lip 2018.

    $ whoami ubuntu $ whereami In a Docker container. Inside a Kubernetes cluster. Running in a VM. On top of a Hypervisor. In someone else's datacenter. $ howdidigethere No. Fucking. Clue.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·