0x1eFF.

@LautaroFain

InfoSec💞. Security Consultant and Exploit Writter at . CS:GO Player 🛡️(Back to business). In-Game Leader currently playing for 🐍.

Vrijeme pridruživanja: svibanj 2013.

Tweetovi

Blokirali ste korisnika/cu @LautaroFain

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LautaroFain

  1. Prikvačeni tweet
    6. lis 2017.

    Are you a 1 or a 0?

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Some Lateral Movement Methods: -Pass the Hash/Relay ((Net-)NTLM) -Pass the Ticket (Silver/Golden) -RDP (Legit creds) -Remote Services (VNC/SSH) -(D)COM (Remote sched tasks, Services, WMI) -Remote Service Vuln (EB) -Admin Shares (PSExec) -Webshell (Chopper) -WinRM (PS Remoting)

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Poništi
  4. 22. sij
    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Apply for a position as a Senior Security Consultant with Immunity at our HQ in Miami, Florida or Arlington, Virginia.

    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Had a lot of fun making this video! In it, I explain how finding a rotation bug in The Witcher III led me to some other fun discoveries! Link to video here: You might know some folks of interest, !

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    When doing some Hardware Hacking sometimes you can’t or prefer to avoid soldering stuff to the PCB. Using Hot Glue Gun and the proper angle could do the trick.

    Prikaži ovu nit
    Poništi
  8. 15. sij

    You heard it, don't miss it if you are around 🔥🎉🔥🎉

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    SE BUSCA Alan ''El pistero'' Martinez, ex seguridad privada de Pablo Escobar, se dice que hace pocas ahoras arribo al pais, cualquier informacion es util. Se Adjunta una imagen de sus tiempos como Seguridad privada.

    Poništi
  10. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    8. sij

    Reversing XignCode3 Driver – Part 1 – Identifying the Driver Entry Point A mini-series of blog posts about XingCode 3. It should be a good way to jump into Windows Driver reversing if you haven't done it before :)

    Poništi
  12. proslijedio/la je Tweet
    6. sij

    THING YOU NEED TO DO TODAY: Submit to the CFP.

    Poništi
  13. proslijedio/la je Tweet
    31. pro 2019.

    New year gift 🎉 Set up a free server to exploit blind vulnerabilities! 1. 2. sudo apt-get install apache2 pagekite 3. add "ServerName localhost" to /etc/apache2/apache2.conf 4. 80->8080 in /etc/apache2/ports.conf 5. pagekite 8080

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    29. pro 2019.

    This weekend I had the time to play with some friends the . I uploaded my write ups to my blog. Enjoy them:

    Poništi
  15. proslijedio/la je Tweet
    25. pro 2019.

    If you are going to Troopers, make sure to go to this talk!

    Poništi
  16. proslijedio/la je Tweet
    25. pro 2019.

    Want to learn how to create a Hardware Implant come to our talk “A Practical Recipe for Hardware Implants” at

    Poništi
  17. proslijedio/la je Tweet
    20. pro 2019.

    AKIRA backgrounds Director: Katsuhiro Otomo

    Poništi
  18. proslijedio/la je Tweet

    Never stop learning. On CS as elsewhere, you either progress or regress.

    Prikaži ovu nit
    Poništi
  19. 25. stu 2019.

    Y si máster, si no pecheo la última baja no soy yo.

    Poništi
  20. proslijedio/la je Tweet
    25. stu 2019.

    Se desvirtúa MDQ y abrimos un server con este mod!?

    Poništi
  21. proslijedio/la je Tweet
    21. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·