Tweetovi

Blokirali ste korisnika/cu @FabiusArtrel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @FabiusArtrel

  1. proslijedio/la je Tweet

    Confirmed! and used a deserialization bug to get code execution (w/ continuation) on the Iconics Genesis64. That's another $25K and 25 Master of Pwn points. That puts them in a commanding lead for Master of Pwn.

    Poništi
  2. proslijedio/la je Tweet

    Confirmed! and used an info leak and a desierialization bug to get code execution w/ continuation on the Inductive Automation Ignition. They earn themselves $25,000 and 25 points towards Master of Pwn.

    Poništi
  3. proslijedio/la je Tweet

    Coming up, gets set to show off his RCE (with continuation) against the Rockwell Automation FactoryTalk View SE in the HMI category. The attempt starts at 12:30.

    Poništi
  4. proslijedio/la je Tweet

    The attempts from also turned out to be a partial win due to the use of a previously reported bug. It's still great research and we're hoping to see more from him in the future.

    Poništi
  5. proslijedio/la je Tweet

    Confirmed! and used a Stack-based Overflow to cause a DoS in the Triangle Microworks SCADA Data Gateway. They earn themselves $5000 and 5 Master of Pwn point. We're off to a great start.

    Poništi
  6. proslijedio/la je Tweet

    And just like that, the very 1st Miami demonstration is a success! Steven Seeley () and Chris Anastasio () successfully showed their DoS against the Triangle Microworks SCADA Data Gateway. Off to the disclosure room for verification.

    Poništi
  7. proslijedio/la je Tweet
    11. sij

    InjuredAndroid CTF is now ready to be solved! Check it out here ! P.S. There's a Pentesterlab Pro gift key up for grabs! 🎉🎉🎉🎉

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. stu 2019.

    Interested in abusing named pipe servers on Windows? Check out my new blog series on the topic Interested in the server and client code? Check it out here: shout outs to everyone who has helped me along the way!!

    Poništi
  9. proslijedio/la je Tweet
    15. lis 2019.

    The writeup and release is here! Tailoring CVE-2015-2215 to Achieve Root -

    Poništi
  10. proslijedio/la je Tweet
    3. lis 2019.

    Trying to modify the Android kernel exploit PoC to change my cred->security->sid to init (7). When I do this the process locks up even without any syscalls. This talk slide 13 mentions this technique. Any thoughts?

    Poništi
  11. proslijedio/la je Tweet

    We would also like to thank all our speakers! Y'all knocked it out of the park! Ryan Breed

    Poništi
  12. proslijedio/la je Tweet

    Will be presenting "Exploring IoT Attack Surface" at BSides Houston 2019!

    Poništi
  13. proslijedio/la je Tweet
    26. lip 2019.

    Pst...Pst... yo you want some 0day?? I got you - Waves Maxx Audio LPE to system - shout out to and for the help! (Ignore the formatting of certain words wrapped in double quotes those will be fixed tomorrow) enjoy 🤫

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    30. tra 2019.

    Remote Code Execution on most of all Dell machines

    Poništi
  15. proslijedio/la je Tweet
    23. tra 2019.

    Ekoparty LA Training Session Added: Software Exploitation via Hardware Exploitation Training (SexviaHex) with /

    Poništi
  16. proslijedio/la je Tweet
    10. tra 2019.

    The material of my 1.5 hour workshop is online. 13-page exercise workbook with step by step instructions: Workshop slides:

    Poništi
  17. proslijedio/la je Tweet

    Video: VerSprite CEO interviews with to discuss threat motives of cyber attackers in data breaches and why schools are a particular target:

    Poništi
  18. proslijedio/la je Tweet

    BSides Houston is back! Saturday, September 7th, 2019. Call for Papers, Sponsors and Volunteers is now open!

    Poništi
  19. proslijedio/la je Tweet

    Exploiting Internet Explorer by writing terrible RegEx

    Poništi
  20. proslijedio/la je Tweet
    30. ožu 2019.

    So the INFILTRATE Pre-Reqs are worth reading even if you are not coming to INFILTRATE:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·