Patrick Walker

@HomeSen

Magenta-hat hacker&forensicator [, , , ]; (inactive) Member of team ALLES!

Deutschland
Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @HomeSen

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HomeSen

  1. Prikvačeni tweet
    20. stu 2019.

    First service at the "ARM-X CTF Challenge #1" by successfully exploited. My write-up "Breaking the webs" can be found, here: That was a fun one. Thank you, Saumil, for putting it up 😀

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati

    1/ I can finally share the exploit demo video for CVE-2020-6007: TL;DR: We managed to infiltrate into a computer network using an over-the-air Zigbee exploit on the Philips Hue Bridge (smart lightbulbs controller).

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    4. velj

    Did you enjoy our / string decryption tutorial ... But you wish we had used instead of 🧐 Check out this awesome tutorial from 🙌

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    OMG this article from is absolutely positively freaking awesome. Seriously. Just read it.

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Interested in learning how to debug macros or learn more about the structure of user forms? In my latest video, I show you how to use the Office IDE to debug a recent

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Wow, long time coming Happy for the result, still not happy with how it was handled by authorities. And the winner in all this? Attorneys

    Poništi
  7. proslijedio/la je Tweet

    Patient benötigt dringend einen Herzschrittmacher, hat aber leider ein neues iPad, das vor der Benutzung mit Schrittmacher warnt. Er hat jetzt kurz Nutzen/Risiko abgewogen und sich gegen ärztlichen Rat entlassen. Nur falls Ihr bisher noch nicht an der Menschheit gezweifelt habt.

    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    FAQ: Directions for connecting to your CTF environment are on your control panel: . *If you've decided you no longer want to participate, please let us know so we can give your registration spot to one of the many community members who are waiting to play.*

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    ⚠️Wanted⚠️: 🔒 victims with the following extensions * WHO 💲PAID 💲THE CRIMINALS 🦹‍♂️* .boot, .leto, .nakw, .rote, .gesd, .merl, .nosu, .kodc, .npsg, .btos Please DM me * ONLY IF YOU 💲PAID💲 *

    Poništi
  11. 30. sij

    Look what just arrived. A big thank you to the guys and gals from Hopefully, the snowflake will now inspire the weather to send some snow over here 😀

    Poništi
  12. proslijedio/la je Tweet

    Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    looking for some new dirs to bruteforce?

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    I think this is pretty significant. Think of AV attack surface as a rich vein of gold nobody has bothered to mine yet. A zillion highly privileged parsers. I know some red teamers who’ve used bugs like these but you don’t hear of them being used ITW much.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    25. sij

    I wrote some automation around gophish, evilginx2, and postfix for faster phishing deployment. Looking for feedback and pull requests :D

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Scripts to detect whether WPA2 clients are vulnerable to KRACK have been updated to work properly on the latest Kali release (which uses a new scapy version).

    Poništi
  17. proslijedio/la je Tweet
    23. sij

    The surgeon’s hand is visibly trembling. The scalpel’s blade glints as it catches the light. I’m a medical student, scrubbed in on the case. I’m not going into surgery, I know that. I’m here for him. He glances at me and notices I’m holding my breath. He grins. “Relax.” 1/

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Read this thread right now. It's the thread you didn't know you needed in your life until you finish reading it.

    Poništi
  19. proslijedio/la je Tweet
    25. sij

    A thread about my ego and how we can better serve in our industry. Story time... 1/9

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    So what does an IoT device need? A hardware root of trust should be provided by the device. This should be a unique identifier and a key which is signed by a mutually trusted authority.

    Prikaži ovu nit
    Poništi
  21. 25. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·