Ivan Kwiatkowski

@JusticeRage

Security researcher 's GReAT. Would-be writer. Maintainer of Manalyze and FFM. Trolling on a purely personal capacity.

Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @JusticeRage

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @JusticeRage

  1. Prikvačeni tweet
    1. stu 2019.

    The video of my talk on ethics in infosec is now online! Of all the talks I've given, it's the one I find the most important. Thanks again to the organizers for accepting it!

    Poništi
  2. proslijedio/la je Tweet

    A solid 10% of being an engineering manager is asking two people if they've talked to each other yet

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  4. 31. sij

    FYI, here is a recording of the talk:

    Prikaži ovu nit
    Poništi
  5. 31. sij

    Jesus, no! Please don't run around screwing up all those ongoing police investigations by doxxing criminals who feel a little too safe. Just give everything you have to law enforcement.

    Poništi
  6. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    Being able to run whatever software you want isn't a poor system architecture. Google wants to control the limited amount of things people can do on a toy OS like ChromeOS. That ELF-based malware is part of what's presumably disallowed is a side effect

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    Security in modern EU telecom industry (5G use case): theory vs reality. Very interesting read! Example: "In a typical large scale service provider, the mobile and/or fixed access networks are operated by the vendor and not the provider."

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  11. 14. sij

    Of all the things taught me with IDA Pro, this has to be the one that blew my mind the most. Bye bye calc.exe. His training () is full of gems like this.

    Poništi
  12. 13. sij

    Sometimes the remedy is worse than the illness.

    Poništi
  13. 9. sij

    Here's a new party game for you and your friends. Each player opens a netcat listening on port 80 on the VPS of their choice, and everytime someone receives an incoming connexion, they drink a shot. (No iptables allowed.)

    Poništi
  14. 8. sij

    .'s talk on centralization is finally online! Takeway: the internet has been centralized for a while; you can either fight it, run your mail server and die on that sword, or accept it and work in that framework. Unsure which is the lesser evil.

    Poništi
  15. 7. sij

    "Everything I thought I know is wrong. They're the ones who should be getting the big bucks!" he said, realizing that configuring a Postfix server was beyond his abilities.

    Poništi
  16. proslijedio/la je Tweet
    29. pro 2019.

    Michael "Dodger" Hirdes, the chairman to the board of the Chaos Computer Club which runs , orchestrated a violent assault on me and my friend this morning. So crazy you wouldn't believe it if there wasn't video. Please help sharing this at congress!

    Poništi
  17. 28. pro 2019.

    Christmas. It's that special time where the whole family sits around a table and verifies everyone's safety number.

    Poništi
  18. 26. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    25. pro 2019.
    Poništi
  20. 24. pro 2019.

    And finally, people who complain about open-source offensive tools... When was the last time you released a free defensive utility? Don't expect people who work for free to protect and/or respect your walled gardens. /thread

    Prikaži ovu nit
    Poništi
  21. 24. pro 2019.

    On the other hand, cyber being an asymetric capability and all, how do we feel about leveling the playfield for hacktivists living under oppressive regimes? (Insert all crypto-wars arguments below.)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·