Tweetovi

Blokirali ste korisnika/cu @JLQuartz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JLQuartz

  1. prije 9 sati

    Encuentran la llave pública con la cual team viewer cifra sus contraseñas. Por estas cosas es que inventaron las funciones de hash, señores!!

    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    If an application uses markdown, make sure to test it for xss. I used [Click here](javascript:alert(1)), to create a link via markdown and when the user clicks on Click here, the xss will get executed. Read this article.

    Poništi
  5. 31. sij

    Liberada la segunda versión de metodología de desarrollo seguro de software del OWASP

    Poništi
  6. proslijedio/la je Tweet
    30. sij
    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Poništi
  8. 28. sij

    Increíble lo que sucede en China, una conspiración

    Poništi
  9. proslijedio/la je Tweet
    28. sij
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    Still getting "timer offset negative" errors from libinput? Well, it's not our fault and here's an explanation why:

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Detecting tags/events on XSS exploitation, useful article (and tool) by

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  13. proslijedio/la je Tweet
    27. sij

    ¡Sorpresa! El otro día advertimos que "Internet Explorer y esa librería (de JS) se puede usar para procesos internos que desconocemos". . Bueno, pues la mitigación que proponían (quitar permisos a la DLL de JS) rompe la impresión, el SFC, el media player...

    Poništi
  14. proslijedio/la je Tweet
    25. sij

    How to crash a Remote Desktop Gateway in 21 lines of clean Python code.

    Poništi
  15. proslijedio/la je Tweet
    22. sij

    clock_gettime: track CPU usage

    Poništi
  16. proslijedio/la je Tweet
    21. sij

    The web framework Django used to use this flawed CSRF defence, which once exposed to attack. Check out this lab on our Web Security Academy to learn how:

    Poništi
  17. 18. sij
    Poništi
  18. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  19. proslijedio/la je Tweet
    18. sij

    DevOps Questions & Exercises ( incl. Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization - Overall 834 questions):

    Poništi
  20. proslijedio/la je Tweet
    17. sij

    Story time: I had a pentest this week, in a locked down environment. It was a RDP like session. The system was preventing powershell, cmd, and other programs. No internet access. I started looking at LOLBins. I discovered I could use diskshadow.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·