Himanshu Mehta | atheM uhsnamiH

@LionHeartRoxx

If you think you have a private life, then probably you are at Deep Web, everything else is public.

Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @LionHeartRoxx

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LionHeartRoxx

  1. Prikvačeni tweet

    So, here we go :) Have a quick look for my session at RSA Conference, USA on "RF Exploitation: IoT/OT Hacking with SDR", March 06 | 8:00-8:50 AM along with

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    Scripts to detect whether WPA2 clients are vulnerable to KRACK have been updated to work properly on the latest Kali release (which uses a new scapy version).

    Poništi
  3. proslijedio/la je Tweet
    14. sij

    Big move forward for the Bluetooth LE interception dongle BLExy. Beside MitM, monitoring and intercepting BLE data, I added some async JavaScript functions to generate data. Demo: arbitrary keys injected into a Logitech mouse, paired over Bluetooth!!!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    28. pro 2019.

    If you want to see a digitally controlled PBX with analog switching produced in the final years of socialist eastern Germany, check out in hall 2 at . Its fully functional and has uplink!

    Poništi
  5. proslijedio/la je Tweet
    30. lis 2019.

    WordPress <= 5.2.3 - Unauthenticated View Private/Draft Posts POC: GET /wordpress/?static=1&order=asc Fix: Remove the static query property Analsyis:

    Poništi
  6. proslijedio/la je Tweet
    29. lis 2019.

    Announcing c0c0n Abu Dhabi 2020 - The Middle East Edition. Stay tuned for more updates!!!

    Poništi
  7. proslijedio/la je Tweet
    28. lis 2019.

    [PoC] CVE-2019-11932 Whatsapp 2.19.216 Remote Code Execution 1. set the listner ip (nc -lvp 5555) 2. run ./exploit and save the content to .gif 3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. lis 2019.

    Totally impressed by WebHID api. Right: USB serial console on nRF52 dongle, which tries to output notifications of a proxied bluetooth mouse. Left: Same info encoded into raw USB HID reports and grabbed by browser using WebHID.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    23. lis 2019.

    running LTE-M with and a local software company in Sophia Antipolis Global Easy Market - so Dear Community, take note: OAI is now IoT and LTE-M capable

    Poništi
  10. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    17. lis 2019.

    Sneak peek preview: prototype of upcoming Quince that will soon shake the open source industry - covering all the channels at the same time with inexpensive hardware and a single antenna

    Poništi
  12. proslijedio/la je Tweet
    14. lis 2019.

    Thank you for giving us the opportunity presenting in your CommSec track. I just finished my talk on RF Exploitation & Defenses along with

    Poništi
  13. proslijedio/la je Tweet
    13. lis 2019.

    Join and in Commsec Talk at at 10:00am today. Interesting talk on IoT and RF for people who are starting with RF attacks.

    Poništi
  14. proslijedio/la je Tweet
    27. ruj 2019.
    Poništi
  15. proslijedio/la je Tweet
    24. ruj 2019.

    🚨Join us & experience the new NULLCON in 2020. We present to you a new venue, ➡️. Save the dates➡️ ☑️Training: 3rd to 5th Mar ☑️Con: 6th & 7th Mar Be a part of 11th edition as a speaker, submit your research➡️ *Registrations opening soon*

    Poništi
  16. proslijedio/la je Tweet
    21. ruj 2019.

    MobSF V2.0 is released! New Dynamic Analyzer supports Android v4.1-9.0. Now you can perform instrumented security tests with ease. ZERO configuration, just run a Genymotion VM before Dynamic Analysis and that’s it.

    Poništi
  17. proslijedio/la je Tweet
    20. ruj 2019.

    @Ateetkibaathai explaining insecurities in Voice-Based Biometrics system Sep chapter meet.

    Poništi
  18. proslijedio/la je Tweet
    20. ruj 2019.

    That’s the power of the community : Hack and Share with your peers in Dubai with from

    Poništi
  19. proslijedio/la je Tweet
    19. ruj 2019.

    Great achievement for our researchers from who got a Best Paper Award for their contribution on EM fault injection on analogue and digital sensors in the far-field and near-field region and propagated/cascaded effects at ASIA Electromagnetics 2019

    Poništi
  20. proslijedio/la je Tweet
    17. ruj 2019.

    Good to be at Asia Electromagnetics 2019 talking about Frequency Selective Surface structures to diversify the use of HPEM generators

    Poništi
  21. proslijedio/la je Tweet
    15. ruj 2019.

    Don’t forget this weekend the meet’up. Our Telecom Security researchers and @Ateetkibaathai will be presenting on Telecom Attack surface (and uncovered flaws) and voice-based biometrics (tools and experiments) respectively

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·