Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @JMakopolo
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JMakopolo
-
Makopolo Mbogo proslijedio/la je Tweet
From persistent XSS to file system read, nice writeup by
@WeizmanGalhttp://bit.ly/370YbJHHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE" https://jatindhankhar.in/blog/responsible-disclosure-breaking-out-of-a-sandboxed-editor-to-perform-rce/ …pic.twitter.com/E7VBsoJwdY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Introduction to mobile network intrusion from a mobile phone: https://medium.com/mobile-stacks-and-networks-security/introduction-to-mobile-network-intrusions-from-a-mobile-phone-9a8e909cc276 … by
@Gallium24,@BuuriMa, Henri,@tmakkonen,@ad_ili_rai_en and myself.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
detect the version of the target SSH server: msf > use auxiliary/scanner/ssh/ssh_version msf auxiliary(ssh_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ssh_version) > set THREADS 256 msf auxiliary(ssh_version) > run
#BugBounty#bugbountytips#hacking#pentestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs
could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same.
Details: https://thehackernews.com/2020/02/philips-smart-light-bulb-hacking.html …pic.twitter.com/dEQMookZNR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Awesome CodeQL query from
@ggolawski that detects many variants of LDAP Injections in Java: Plain Java JNDI, UnboundID, Spring LDAP and Apache LDAP API. We are pleased to award him our maximum bounty reward $3000 https://github.com/Semmle/ql/pull/2651 …pic.twitter.com/wXJPh4ZwQ0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
I've just released new version of the iOS Security Suite
* New verbose&filterable amIJailbrokenWithFailedChecks() method
* New anti-re indicator
pic.twitter.com/JADIHxgzzY
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Just a quick blog post: Easily leaking passenger information on a
@yeswehack program. Be careful what you share online! :) https://medium.com/@zseano/easily-leaking-passenger-information-on-an-airline-18f99b22cf95 …pic.twitter.com/Iq9IsQrqUs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
The NIST Risk Management Framework Available in High Resolution: https://cyberstartupobservatory.com/infographics/ For further information on cyber topics & innovation: https://cyberstartupobservatory.com/download-observatory-all/ …
#CyberSecurity#InfoSec#1stGlobalCybersecurityObservatorypic.twitter.com/52Nb0eFOAZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
If you wondered why AV has false positives, take a look at this excel file: 1. Runs code automatically on opening 2. Uses native APIs that manipulate memory 3. Instantiates a COM object defined in a text string in a macro Benign. https://www.virustotal.com/gui/file/f08d2a2daa5aca5cf88db120198727f7965283c5aa6b4ea3d9452238250026f4/detection …pic.twitter.com/oOZIVw9gAS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
During his research into web-cache poisoning,
@albinowax stumbled upon a new route-poisoning trick for systems built on Zend and Symfony frameworks. Try it for yourself:https://portswigger.net/web-security/access-control/lab-url-based-access-control-can-be-circumvented?utm_source=twitter&utm_medium=social&utm_campaign=existing-labs …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Never give up when the going gets tough. Never quit at the first sign of difficulty. Life was never meant to be easy; it’s a constant struggle with lows and highs. The times when it’s most important to persevere are the times that you will be most tested. Keep going. Trust Him!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Here is slide of
@fransrosen talk on "A methodology using fuzzing and info disclosure"https://www.slideshare.net/bsidesahmedabad/frans-rosn-keynote-at-bsides-ahmedabad …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
A new utility has been released by Japan CERT (computer emergency response team) that allows Windows users to easily check if they are infected with Emotet.https://www.bleepingcomputer.com/news/security/new-emocheck-tool-checks-if-youre-infected-with-emotet/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
#infosec#pentest#bugbounty https://github.com/1N3/IntruderPayloads …pic.twitter.com/GMXxp8hQuT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Makopolo Mbogo proslijedio/la je Tweet
My writeup for H1-415 CTF. Again, hope that you enjoy it. :) https://github.com/manoelt/H1-415-CTF-Writeup … Thanks,
@NahamSec@0xacb@Hacker0x01Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Makopolo Mbogo proslijedio/la je Tweet
Last year,
@wvuuuuuuuuuuuuu researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:https://blog.rapid7.com/2020/02/04/doublepulsar-rce-2-an-rdp-story/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Makopolo Mbogo proslijedio/la je Tweet
Bruteforce subdomains from browser (thanks to Marzavec). Works by using DNS over HTTP for resolution. https://gist.github.com/marzavec/a74276a88317f0572507f24bb0772708 …
#security#bugbounty#bugbountytip#security#redteam#osint#discoverypic.twitter.com/lxygQ8RqSKPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
