Hassan Abbas 

@MrHasanabas

I åm jàćk øf āłł trâdęš. CA 👨🏻‍🎓. Hobby: Seçurįty Ęńthūšîåst 👤;  iPhone, BlackBerry, Líñùx. 04-04-16 BlockeD

  Terminal /usr/home
Vrijeme pridruživanja: veljača 2014.

Tweetovi

Blokirali ste korisnika/cu @MrHasanabas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MrHasanabas

  1. proslijedio/la je Tweet
    13. pro 2019.

    The CVE-2019-18935 is a severe insecure deserialization vulnerability affecting UI. Understand its impact + learn to safely patch your software in this post from : (With thanks to + )

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    NEW 🧨: My analysis on the explosive talk by former Android Security engineer about pre-installed apps from 😱

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. pro 2019.

    As a Christmas gift, a new cheat sheet has been released for all of you deploying databases! Let us know what you think about it :)

    Poništi
  4. 7. sij

    Else timing challenge. All has done :)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    6. sij

    TrendMicro identified Android apps using CVE-2019-2215 (Binder bug). Some of the apps are from March 2019. They linked the apps to SideWinder. My blog on the Binder bug:

    Poništi
  6. 6. sij

    ⁩ Web Cache poisoning Basic has done ;) X-Forwarded-Host: XSS

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. sij

    Ok, because I have to sleep now. Here's my latest find, a full dump a multiple sessions logging onto Unauthorised Access (another of by favourites), inc the users password, massive file lists and a few textfiles

    Prikaži ovu nit
    Poništi
  8. 24. pro 2019.

    ⁩ really did an excellent Work. He has idea in mind & then he created Tomnomnom I really enjoy your video and your yourself whispering 😆 ⁩ was suggesting sometime. But perhaps you were only listening yourself ...🙃👨🏻‍💻

    Poništi
  9. proslijedio/la je Tweet
    2. lip 2019.

    Sunday morning blog post: Using Frida to steel credentials from KeePass.

    Poništi
  10. 23. pro 2019.

    Response by ⁦⁩ He is correct. mostly claim every time, he made it first time ever etc Things you could see in his presentation :)

    Poništi
  11. 22. pro 2019.

    Think about network generation encryption: 2G 3G Or 4G ;)

    Poništi
  12. 20. pro 2019.
    Poništi
  13. 16. pro 2019.
    Poništi
  14. proslijedio/la je Tweet

    Just posted From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13 - to be followed up with a second writeup on bug I've found with these tools.

    Poništi
  15. proslijedio/la je Tweet
    7. pro 2019.

    A full browser compromise chain (-2019-11708 & -2019-9810) targeting on 64-bit by (thank you for sharing this awesome research dude!)

    Poništi
  16. proslijedio/la je Tweet

    If you are new to reverse engineering, there are a lot of tools that you'll need to learn. I've brain-dumped the basics here for anyone who wants to learn.

    Poništi
  17. proslijedio/la je Tweet

    If you're learning golang from scratch, this blog have great posts on basic concepts:

    Poništi
  18. proslijedio/la je Tweet
    2. lip 2019.

    If you use and Firefox, your Burp probably catches a bunch of distracting Firefox traffic like captive portal detection, OCSP, update checks etc. To have this traffic bypass burp proxy, you can use FoxyProxy allow/deny lists. My config is at:

    Poništi
  19. proslijedio/la je Tweet

    I am starting a new thing named Research Notes, which is the open source fraction of my research notebook on systems internals, vulnerability discovery and exploit development: And the first Research Note: “iBoot address space”

    Poništi
  20. proslijedio/la je Tweet

    A lot of people are asking about starting a blog, so I collected all my mistakes and victories to a single location. Hope it helps someone!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·