Jin Huang

@Fault338

Seneca Student | Aspiring Malware Researcher | SecOps

Toronto, Ontario
Vrijeme pridruživanja: veljača 2019.

Tweetovi

Blokirali ste korisnika/cu @Fault338

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fault338

  1. proslijedio/la je Tweet
    21. sij
    Odgovor korisniku/ci

    By the way, if your SSID ends with the suffix _nomap, you'll be opted out of the Google Wifi location tracking database. source:

    Poništi
  2. proslijedio/la je Tweet
    10. sij
    Poništi
  3. proslijedio/la je Tweet
    6. sij

    CVE's are like a girlfreind. I dont have one

    Poništi
  4. proslijedio/la je Tweet
    7. sij

    This is a pretty cool website that was referenced in one of 's videos: You enter a binary name (such as vi/nmap/etc.) and it tells you how you can use use it to escalate privileges!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    11. pro 2019.

    every linux networking tool I know (get the PDF at !)

    Poništi
  6. proslijedio/la je Tweet
    23. stu 2019.

    🎶On the first day of Christmas my employer gave to me, a baaaadly configured Active Directoreeeeeeee🎶

    Poništi
  7. proslijedio/la je Tweet
    10. stu 2019.

    Someone sent me this. I don't remember who tho I apologize. Just wanted to share it. If the original author of this picture sees this please let me know to give you proper credit.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    This is probably the easiest way to get vulnerability management across your Windows estate quickly (including application level scanning too). No agents, it’s built into Windows Defender.

    Poništi
  9. 1. stu 2019.

    Made my first badge ever at the soldering village with . Thanks

    Poništi
  10. 31. lis 2019.

    I’ll be attending for the first time this year with a bunch of friends. I have a feeling this is going to be awesome.

    Poništi
  11. proslijedio/la je Tweet

    If there is one thing you wish someone would have told you about InfoSec at the beginning of your career — what would it be?

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. lis 2019.

    Today we introduce Malware Trend Tracker – dynamic articles that collect the freshest info about various types of malware. The best way to learn how to analyze malware is now even easier and faster. Everything as we love in ANYRUN! Watch, Read, Rerun! 😋

    Poništi
  13. proslijedio/la je Tweet

    Ok, , if you get 1000 likes on this tweet, I will make an entire goose-themed category in the CTF this year.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    16. lis 2019.

    either chaotic good or lawful evil, no in between 😂

    Poništi
  15. 10. lis 2019.

    escape room at We managed to do really good and placed third.

    Poništi
  16. proslijedio/la je Tweet
    7. lis 2019.

    this image is life how did i just discover this

    Poništi
  17. 6. lis 2019.

    Upgrade from being an attendee to sponsor with one simple trick. Just forget your badge.

    Poništi
  18. proslijedio/la je Tweet

    ./pwn-pulse.sh Automating Exploitation of a Pulse SSL VPN Arbitrary File Read Vulnerability via

    Poništi
  19. proslijedio/la je Tweet
    3. lis 2019.

    PoC Step () 1.make sure to set the listner ip in exploit.c inorder to get shell nc -lvp 5555 or whatever port. 2. compile gcc -o exploit egif_lib.c exploit.c 3. run ./exploit and save the content to .gif 4. send to victim.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    26. ruj 2019.

    Threat Level: Honk

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·