Minh-Triet Pham Tran

@MinhTrietPT

APT Hunting, Threat Hunting, Incident Response, Forensics Analysis, Red Team/Internal System Penetration Testing as a Service

Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @MinhTrietPT

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MinhTrietPT

  1. Prikvačeni tweet
    23. pro 2019.

    Is there someone at Facebook tracking APT32 attacks against high-profile users? I need to contact him/her as soon as possible, I am helping a victim of them now.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    11. sij

    1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.

    Poništi
  3. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  4. proslijedio/la je Tweet
    5. sij

    I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?

    Poništi
  5. proslijedio/la je Tweet
    6. stu 2019.

    Great news Android folks! + + were selected to join forces with Google Play Store to scan apps for malicious behaviour. It is a great way to harden security of Google Play

    Poništi
  6. proslijedio/la je Tweet

    So glad to hear that attendees found my writing presentation useful! For those who couldn’t be there, here’s the rating sheet for the Right Information: Threat Reports that I shared:

    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Version 3.5 is out with the Ghidra decompiler integrated in Carbon (no Ghidra or Java installation necessary). The decompiler features navigation, comments and renaming of functions, labels and variables. Happy hacking!

    Poništi
  8. 18. sij

    I am so sad that there's still no one from Facebook messaging me or answering messages from me/the victim yet. Only one Facebook security employee answered me but told me that it's out of scope for him.

    Poništi
  9. 18. sij

    I am so sad that there's still no one from Facebook messaging me or answering messages from me/the victim yet. Only one Facebook security employee answered me but told me that it's out of scope for him.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    15. sij
    Poništi
  11. proslijedio/la je Tweet
    6. pro 2019.

    Excited about weird protocol tricks and device fingerprinting? The video from my Duo Security Tech Talk - Modern Network Discovery is now online at Slides: Thanks again to for hosting!

    Poništi
  12. proslijedio/la je Tweet
    13. sij
    Poništi
  13. proslijedio/la je Tweet

    While I've started work on a second book, I've also decided to drop the minimum cost of my book to free feel free to share with those who are looking at starting out in pentesting or bug hunting, I've been told it's a pretty good read! RT please

    Poništi
  14. proslijedio/la je Tweet
    10. sij

    What has your work taught you that other people don't realize?

    Poništi
  15. proslijedio/la je Tweet
    8. sij

    I have just published an IDA Python script mixing 's CodeCut and IDAMagicStrings. It's available here:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    27. pro 2019.
    Odgovor korisnicima

    I would ask them: When you analysed/reversed samples, what was the most exciting thing? What the most difficult thing you solved that you are proud of? Is there anything that could have helped you to achieve that easier?

    Poništi
  17. proslijedio/la je Tweet
    27. pro 2019.
    Odgovor korisniku/ci

    If someone is interested in infosec and starts reversing/analysing, they will stumble over problems and questions, e.g., missing tools, missing info ... This is what they should use for their thesis. If you dictate a topic, it won't be their heart's interest.

    Poništi
  18. proslijedio/la je Tweet
    28. pro 2019.

    IDA Pro 7.x plugin that integrates decompiler code by Chris Eagle ( ) Awesome!

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.

    28 samples of government malware awaiting further scrutiny. We ask the international community to challenge, verify and extend our analysis.

    Poništi
  20. proslijedio/la je Tweet
    15. pro 2019.

    It would be incredible interesting if defenders across all industries worked and shared knowledge as publicly as the offensive security industry does. I wonder where we would be now if that happened?

    Poništi
  21. proslijedio/la je Tweet
    26. pro 2019.

    Any ideas for Masters/Bachelors thesis topics around malware analysis, reverse engineering, low-level security or other infosec topics? Please RT too - I get this question a lot and I always struggle to answer. So I hope to use our community's wisdom and send folks here :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·