Kapla Hodot

@KHodot

security blah blah blah

Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @KHodot

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @KHodot

  1. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    Um holy sh*t. This certainly makes it sound like Parnas and co. were actively tracking Yovanovitch's movements. This could explain why Yovanovitch was moved out of Ukraine so quickly.

    Poništi
  3. proslijedio/la je Tweet
    28. pro 2019.

    I got swatted a few hours after this tweet. Honest thank you to the police department (assault and tactical team) for staying cool as you woke me up and behaved very well with my 80 year old father and myself as “potential” targets with your assault rifles and situation. 😌

    Poništi
  4. 3. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    19. stu 2019.

    A story... Back in the l0pht days, I ran/configured/maintained the Unix system that was “the L0pht”. Here are the tricks, and here’s how it was attacked... 1/N

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    12. stu 2019.

    Shipping soon. We have a lot to ship this year so please be patient.

    Poništi
  7. proslijedio/la je Tweet
    27. lis 2019.

    Stopped using PowerShell for attacks? Seems to be working just fine for 🇻🇳 lang.ps1 uploaded yesterday (3/56): I appreciate their signature obfuscation style (pictured) The underlying backdoor here is very creative... [1/2]

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    It's another Humble Bundle! Pay what you want for over $700 of best-selling Linux, BSD, and Open Source titles to benefit the and . Thank you for your support and please RT!

    Poništi
  9. proslijedio/la je Tweet
    25. lis 2019.

    I am excited to announce that the ReversingHero video course is complete! ReversingHero is a Reverse Engineering self learning kit, containing 15 reversing challenges of gradual increasing difficulty (Linux, x64).

    Poništi
  10. proslijedio/la je Tweet
    21. lis 2019.

    I just published an in-depth analysis of how the network protocol works. Also I've released a tool which emulated this protocol and is capable to download new & from the C&Cs. It's integrated with and .

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    The latest XKCD is near-and-dear to my heart. It's a conversation that replays frequently in infosec/cybersecurity -- on both sides, non-techies trying to avoid security, and non-techies trying to impose security.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet
    11. lis 2019.

    Here are my slides from "What's Up with WhatsApp?" where instead of talking about the bug, I talk through the process of analyzing the bug, including a comparison of the 4 binary diffing tools y'all suggested to me.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Do not install random Profile on your iOS devices. A fake checkra1n jailbreak is distributed on checkrain[.]com. Look at the post from and I about this topic: Here is a short video of the fake jailbreak:

    Poništi
  15. proslijedio/la je Tweet
    13. lis 2019.

    Detect suspicious keyboard layout loads with this config & Sigma rule > Example: Allows you to detect CN 🇨🇳, VN 🇻🇳, IR 🇮🇷 remote users that connect to your servers maintained by US 🇺🇸 staff only Sysmon Config Sigma Rule

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    🔥 CVE-2019-14287 A flaw in Sudo—that comes installed on almost every OS—could let users run commands as "root" even when they're restricted. Details ➤ How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    3. lis 2019.

    Video for my RECON 2019 talk, "Automation Techniques in C++ Reverse Engineering", is now available:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·