rZwhyKNa!QggqKGs84

@GV6hs9v0WA

most 1337 haxxor you'll ever meet. Definetly not a Russian bot or related to the Chinese government! 我可以会中文!

Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @GV6hs9v0WA

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GV6hs9v0WA

  1. proslijedio/la je Tweet

    5 new high-impact vulnerabilities in discovery protocol expose tens of millions of enterprise-grade routers, switches, IP phones and cameras to hackers. Details: Collectively dubbed ‘CDPwn,’ 4 out of 5 issues lead to Remote Code Execution attacks.

    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. proslijedio/la je Tweet
    4. velj

    Very useful tool if you are studying Drivers. Also really enjoyed the book: Windows Kernel Programming

    Poništi
  4. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    My Sysmon config sees the shell/open reg key being written, if you want to alert on this. /cc

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    We're deeply saddened by this news. Lars was a wonderful person and a great Community Manager at the Xen Project. Our deepest condolences go to his family and friends.

    Poništi
  7. proslijedio/la je Tweet
    29. sij
    Poništi
  8. proslijedio/la je Tweet

    Agree to disagree.

    Poništi
  9. proslijedio/la je Tweet
    25. sij

    If anyone is interested by an example of the Windows Next Generation Cryptography API (bcrypt.lib) - especially after CVE-2020-0601 - I wrote a simple C++ program that encrypt and decrypt a string. Link:

    Poništi
  10. proslijedio/la je Tweet
    25. sij

    How to crash a Remote Desktop Gateway in 21 lines of clean Python code.

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    22. sij
    Poništi
  13. proslijedio/la je Tweet
    18. sij

    v.1.2 released, the tool can now run over 50 transforms - highlights: * Added WHOIS transforms * Integrated AlienVault OTX DirectConnect API * Added certificate transparency log mining for fast subdomain discovery

    Poništi
  14. proslijedio/la je Tweet
    2. sij 2019.

    Soooo, after a few evenings of work, I've 100% broken Widevine L3 DRM. Their Whitebox AES-128 implementation is vulnerable to the well-studied DFA attack, which can be used to recover the original key. Then you can decrypt the MPEG-CENC streams with plain old ffmpeg...

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    15. sij

    This is a thread on what we know about Apple’s prototyping and development process of manufactured products. 1/ All info here could be incomplete/wrong/outdated. I may (or may not) update this thread in future if I have enough things to share 😁

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    CVE-2020-0609 and CVE-2020-0610 are interesting... 🤔

    Poništi
  17. proslijedio/la je Tweet

    Attention! Hackers actively exploiting a new critical 0-day bug (CVE-2019-17026) in that could let remote attackers take complete control over your computers just by tricking you into visiting a malicious site. Read ➤ Update your browser now!

    Poništi
  18. proslijedio/la je Tweet
    6. sij

    A huge thanks to for responsibly covering this story of my assault at , and not taking the bait on the disinfo. I take back 5% of anything I've ever said about germans

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    5. sij

    SSH Pentesting Guide - A Comprehensive Guide to Breaking SSH :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·