Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Eliyahu_Tal_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Eliyahu_Tal_
-
Tal Eliyahu proslijedio/la je Tweet
Post Exploitation Collection
#infosec#pentest#redteamhttps://github.com/mubix/post-exploitation …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Tal Eliyahu proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Tal Eliyahu proslijedio/la je Tweet
Our 36c3 presentation video : https://media.ccc.de/v/36c3-10505-the_great_escape_of_esxi#t=708 … and slides: https://url.cn/51kIMxY
It's really a nice party. Hope to see you next year.
#36c3Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Slides from my semi impromptu talk on
#API#Security#Testing at@Nullblr and@OWASPBangalore January monthly meetup are now online. https://speakerdeck.com/riyazwalikar/api-security-testing-null-bangalore-january-2020 …#websecurity#owasp#apisecurity#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I specialise in a very specific type of security, subconscious securityhttps://youtu.be/i2AmxJEl8ng
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Very Insightful talk by Frank DiGiovanni (
@D9_Pilot) - There is growing community of hackers who refer to themselves as "#Chameleon#Hackers" and practice an organizational socialization technique they call "#codeswitching.https://www.youtube.com/watch?v=mzElbOlzivE …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
11 Vulnerabilities Detected in the protocols used by 5G Networks
#5G#4G#Vulns#Protocols#Flaw#Tracking#Spoofing https://headleaks.com/2019/11/14/11-vulnerabilities-detected-in-the-protocols-used-by-5g-networks-bTBoMGtIaWcyZFdTRlN3bnNFK3piZz09 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
#day36#bugbounty#learning WebSocket attacks
1. https://footstep.ninja/posts/idor-via-websockets/ …
2. https://labs.detectify.com/2017/02/28/hacking-slack-using-postmessage-and-websocket-reconnect-to-steal-your-precious-token/ …
3. https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html …
4. https://hackerone.com/reports/395729
5. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
6. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
7. https://medium.com/@sharan.panegav/account-takeover-using-cross-site-websocket-hijacking-cswh-99cf9cea6c50 …
8. https://www.notsosecure.com/how-cross-site-websocket-hijacking-could-lead-to-full-session-compromise/ …
#day36 ENDS :)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Interesting Bookmarks:
#Emotet->#TrickBot->#Ryuk High-Value Target https://youtu.be/u1XvMcwdvgI?t=319 …
TrickBot Makes Headlines w/ MSP & LA Times
https://youtu.be/u1XvMcwdvgI?t=481 …
More Technical RE
https://youtu.be/u1XvMcwdvgI?t=812 …
Detections & Mitigations: Conclusion
https://www.youtube.com/watch?time_continue=1758&v=u1XvMcwdvgI&feature=emb_logo …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Document search engines 2
#osint http://pdfyes.com http://nuokui.com http://faganfinder.com/filetype/ http://printfu.org http://5y1.org http://filesearchbox.com http://vadlo.com/Powerpoint_Search_Engine.html … http://pdfsearches.com http://searchfiles.de http://manualslib.com pic.twitter.com/MBBfk2CIgl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
#Citrix#Netscaler#Shitrix
Snort
https://doc.emergingthreats.net/bin/view/Main/2029206 …
Sigma
https://github.com/Neo23x0/sigma/blob/master/rules/web/web_citrix_cve_2019_19781_exploit.yml …
YARA
https://github.com/Neo23x0/signature-base/blob/master/yara/exploit_shitrix.yar …
IOCs
https://otx.alienvault.com/pulse/5e1c293e07c770f36d232489 …
Nmap NSE
https://github.com/cyberstruggle/DeltaGroup/blob/master/CVE-2019-19781/CVE-2019-19781.nse …
MSF
https://github.com/rapid7/metasploit-framework/blob/a64b0fa9e75befc3ffdb6129e88a6f6dd4c31208/modules/exploits/unix/webapp/citrix_dir_trasversal_rce.rb …
HoneyPot
https://github.com/MalwareTech/CitrixHoneypot …
SSH checkhttps://twitter.com/cyb3rops/status/1216310642552049666 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
If you missed my talk at
@aivillage_dc on facial recognition, check it out here!https://www.youtube.com/watch?v=b-lkYtprgVw …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Blackhat anonymization https://archive.cyberguerrilla.org/a/2011/?p=3322 Burner Tor .onions + rotation, backup & restore https://chown.io/guide-generate-rotate-onion-addresses/ … Tor .onions + gateway + workers DoS defense https://chown.io/defend-against-ddos-tor/ … Multihop I2P tunnel https://github.com/cryptolok/GhostInTheChaos … Tor .onion + BSD jail https://www.martini.nu/blog/2010/06/tor-vbox.html …pic.twitter.com/jG4hEluLD2
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
One-liners that aids in penetration testing operations, privilege escalation and more
#infosec#pentest#bugbounty https://github.com/D4Vinci/One-Lin3r …pic.twitter.com/ogTlbE0mMcHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Unfortunately, all five carriers used authentication methods that are considered insecure in the computer security community. Taken together, these findings help explain why SIM swaps have been such a persistent problem. More details in our paper: https://www.issms2fasecure.com/assets/sim_swaps-01-10-2020.pdf …pic.twitter.com/2Qo6SHX9Rc
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tal Eliyahu proslijedio/la je Tweet
Been meaning to turn it into a table, clean it up and add the cryptocurrency exchanges that have been killed due to losing all their cryptostuff, so here's a nicer version sorted by when each went out of business. 16 now, with the addition of all the hacked crypto exchanges.pic.twitter.com/b4T9crfvdw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Organization Suggested Security Working Groups & Compliance Teams https://tech-wreckblog.blogspot.com/2020/01/organization-suggested-security-working.html?m=1 …pic.twitter.com/bCkD3XRDVx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.