Tweetovi

Blokirali ste korisnika/cu @Ohio813

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ohio813

  1. prije 3 sata

    Cyber experts weigh in on the app that crashed the Iowa caucus via

    Poništi
  2. proslijedio/la je Tweet

    I've always been good at remembering numbers, phone numbers, account numbers, etc. In fact, I worry it looks suspicious to non-nerds, so when I'm asked for a number I pretend to look something up on my phone or rustle some papers around first 😂

    Poništi
  3. proslijedio/la je Tweet
    prije 15 sati

    People ask me all the time how to get started. I have no clue. I forced myself to watch all the really technical conference vids on youtube, I didn't understand them at all. I did start to grasp the larger concepts eventually. Then I played around with existing PoCs & found bugs.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    NEW: We have published the full .apk file of the app that malfunctioned in the Iowa Caucus:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    3. velj

    A lot of people have been asking me how i'm studying Reverse Engineering and what material I am using so I decided to share my notes with those who are interested once I finish 🌸 I will be using the resources(workshops, tutorials and books, etc.) that I have studied from.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    5. velj

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. velj

    If you're interested in bootstrapping iOS kernel security research on A13, keep an iPhone 11 on iOS 13.3. I will be releasing a proof-of-concept exploit that provides kernel read/write on iPhone12,3 17C54.

    Poništi
  8. proslijedio/la je Tweet
    4. pro 2019.

    Qualys Security Advisory: Authentication vulnerabilities in OpenBSD's auth system (CVE-2019-19521). LPE on default install via xlock (CVE-2019-19520) and su (CVE-2019-19519). Local root if S/Key or yubikey is enabled (CVE-2019-19522). More details at

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    We're excited to welcome Felix Wilhelm () to Project Zero today!

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    Shoutout to the guy who made small talk to me outside shmoocon while i was smoking a cigarette. It's quiet for a second and he goes "so do you uh use metasploit a lot?" and i was like "oh uh actually i used to use it all the time" and he goes "...yeah i was just joking man" LMFAO

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    An experienced reverse engineer is good because they have a great sense of what not to get hung up on. Shedding the unnecessary clutter reduces a chaotic mess to a slightly less chaotic mess, a chaotic mess that is actually exhilarating to navigate. A valuable life lesson, IMO.

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    I think it's just easier clicking random stuff then reversing IPC related stuff. Most of that IPC related stuff (rpc/com/etc) can be triggered naturally by clicking stuff. Found 12 bugs this way last year.. don't think I worked more then 2-3 months total lol, was always hiking.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    NSO statement in my inbox: This instance wasn't us, and we can prove it because our tech doesn't let us target US phone numbers. Again, NSO comms has lied to my face before, though this one seems unequivocal. Also, threatening lawsuits on this story, which is classy.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij
    Poništi
  16. proslijedio/la je Tweet
    21. sij
    Poništi
  17. proslijedio/la je Tweet
    27. sij

    I see I’m going to be reading about DNS, SeaTurtle, and Turkey today.

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    This is what it looks like when Saudi Arabia uses NSO Group’s tools to target a journalist.

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    This is a great effort to get more people into RE :

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    This is your regular reminder to people in the tech industry that the choices you make in your job matter.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·