Lexfo

@LexfoSecurite

Offensive IT security

Paris
Vrijeme pridruživanja: veljača 2013.

Tweetovi

Blokirali ste korisnika/cu @LexfoSecurite

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LexfoSecurite

  1. proslijedio/la je Tweet
    14. sij

    A Sandbox Escape was found on F5 BIG IP APM leading to an XSS on the portal, by from the Ambionics team :

    Poništi
  2. proslijedio/la je Tweet
    6. sij

    Learn how we broke PHP's Mersenne Twister PRNG

    Poništi
  3. 28. lis 2019.

    is happy to sponsor ! Come and meet us in Bordeaux, December 3-6!

    Poništi
  4. 16. lis 2019.

    LEXFO team sheds some light on a privilege escalation vulnerability in SUID on BMC Agent ! Check the GitHub for technical details :

    Poništi
  5. 3. srp 2019.

    . is coming ! We look forward to seeing you there !

    Poništi
  6. proslijedio/la je Tweet
    27. lip 2019.

    Google CTF 2019 Quals: glotto writeup [] A tough but really fun SQL injection challenge.

    Poništi
  7. proslijedio/la je Tweet
    14. lip 2019.

    Nous tenons à remercier encore une fois nos sponsors

    Poništi
  8. 14. lip 2019.

    LEXFO est sponsor de la 2019 !

    Poništi
  9. 7. lip 2019.

    Les auditeurs participent au 2019 via, notamment, la co-création du challenge, mais aussi en tant que membre du comité de programme.

    Poništi
  10. 3. svi 2019.

    LEXFO is at in Miami! Come and meet our experts :)

    Poništi
  11. proslijedio/la je Tweet
    2. svi 2019.

    Thank you for supporting as a PLATINIUM sponsor ! More infos here :

    Poništi
  12. proslijedio/la je Tweet
    8. tra 2019.

    EXPLOIT for CARPE (DIEM): CVE-2019-0211 Apache Root Privilege Escalation

    Poništi
  13. proslijedio/la je Tweet
    29. ožu 2019.

    Le challenge est en ligne ! Retrouvez le ici :

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    29. ožu 2019.

    Details and exploitation of the unauthenticated SQL injection on .

    Poništi
  15. proslijedio/la je Tweet
    25. ožu 2019.

    Tomorrow, releases a patch for an unauthenticated and we reported a few months ago. We'll describe the vulnerabilities, and how they can be exploited, in our next blog post. Patch your systems !

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. velj 2019.

    EXPLOITING DRUPAL8'S REST RCE

    Poništi
  17. proslijedio/la je Tweet
    21. velj 2019.

    Just added a JSON encoder to PHPGGC. It is a small patch but it comes in handy for the last Drupal CVE :)

    Poništi
  18. proslijedio/la je Tweet
    15. stu 2018.

    PHPGGC: I merged PharGGC (and some more) ! We now support TAR, ZIP and PHAR file formats, along with polyglot JPEG as described in his talk.

    Poništi
  19. 30. lis 2018.

    We are hiring a Pentester ! Message us to find out more information about this opportunity !

    Poništi
  20. 8. lis 2018.

    Thanks to the readers' feedbacks. The "Lab Setup" section has been updated. Getting the proper configuration and running System Tap should be easier now!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·