Martin Gallo    

@MartinGalloAr

Director of Strategic Research at / Co-organizer / #12 / words are mine

Sur
Vrijeme pridruživanja: studeni 2008.

Tweetovi

Blokirali ste korisnika/cu @MartinGalloAr

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MartinGalloAr

  1. Prikvačeni tweet

    Tagged and released version v0.7.1 of 's Wireshark plugin for SAP protocols! It's just to make sure everyone can run it on 3.0, now that 3.2 is out. Will put those changes as a new branch shortly. Also some new stuff comming 😃

    Poništi
  2. proslijedio/la je Tweet

    Estamos buscando postulantes para presentar a las becas doctorales de y de y trabajar en y en un proyecto de aplicado a imágenes oftalmológicas. Más info 👉

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Say hello to OpenSK: a fully open-source security key implementation -

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    📣 Atención! Hoy nos juntamos en nuestra reunión mensual para compartir un rato y charlas de InfoSec! Acercate a las 20hs en RanaBaris! 🍻😈

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Every notification makes up the user’s experience. Every notification is the result of a UX design decision (even if the person deciding didn’t know they were making a UX design decision). Every decision was made by a UX designer. Everyone is a UX designer.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    19. sij

    Tool review: pysap (SAP network protocol package generator) by

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    If you're playing with Kerberos and want to view the encrypted parts in Wireshark you can do so with a keytab file. Since impacket was missing structures for this I added a script to my forest trust tools repo which easily allows adding multiple keys:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Este año un grupo de investigadorxs y docentes de y profesionales de la industria del software de estaremos dictando por primera vez la Diplomatura Universitaria en Inteligencia Artificial

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    18. sij

    Mi profesor de Análisis 2 se inventaba los ejercicios de final en el momento. Para escribir los resultados de las integrales necesitabas 3 páginas. Mega imposible. Imaginen el bello recuerdo que tengo del doctor Peña.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. sij

    As much as I love cloud, I'm super excited to be talking about Kerberos and Active Directory trusts (and breaking forest trusts again) at Black Hat Asia!

    Poništi
  12. proslijedio/la je Tweet
    16. sij

    [BLOG] Reverse Engineering a Philips TriMedia CPU based IP Camera - Part 3 by :

    Poništi
  13. proslijedio/la je Tweet
    14. sij

    Hey, new upload to Windows-Insight - the Windows Telemetry ETW Monitor framework: The framework monitors and reports on ETW (Event Tracing for Windows) activities for providing data to Windows Telemetry. Works on Windows 10, version 1909. [Thread: 1/4]

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    31. pro 2019.

    Happy New Year! If you pentest SAP systems and you gain access to a service account RFCpwn will create highly privileged dialog users and dump hashes using RFC calls and provided credentials:

    Poništi
  15. proslijedio/la je Tweet
    13. sij

    Videos and slides from ATT&CKcon 2.0 have been available since shortly after the conference, but we recently updated our website to make them much easier to find. Everything from ATT&CKcon 2018, and 2.0 can now be found at .

    Poništi
  16. proslijedio/la je Tweet

    "SIM swap" attacks have been in the news for years. They’ve enabled serious financial crimes and even a hack of the Twitter CEO's account. We spent 6 months researching how vulnerable wireless accounts are to these attacks. Our draft study is out today.

    Prikaži ovu nit
    Poništi
  17. Technologies changed but lots of content and concepts are still pretty relevant! Shout out to articles from , , and more! 👏🏾

    Prikaži ovu nit
    Poništi
  18. Just found out a bunch of 's The Architecture Journal from 2006~2008, delivered by mail after subscription. In my early career years, those were a way for me to enter into the software architecture world and start thinking about it from an enterprise standpoint 🤩

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    7. sij

    We are pleased to announce that 2020 will be live-streamed. Link:

    Poništi
  20. proslijedio/la je Tweet
    5. sij

    So, and I decided to run on the weekend before in Mannheim, Germany. We've reserved the local technology museum and would love to see you all there. Registration is just about to open and we're looking forward to a bunch of cool talks!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    1. sij

    Here are some stats from our Aposemat IoT hardware honeypots. A total of 14M attacks observed since May 2019 of only 5 honeypots. Pretty cool!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·