Rick 🗸

@Raz0r3

• MS Student • PGP: • Interested in: Data, ML, Security.

Vrijeme pridruživanja: travanj 2012.

Tweetovi

Blokirali ste korisnika/cu @Raz0r3

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Raz0r3

  1. proslijedio/la je Tweet
    prije 9 sati

    [PoC] Heap Overflow in F-Secure Internet Gatekeeper POST /submit HTTP/1.1 Host: 192.168.0.24:9012 Content-Length: 21487483844 AAAAAAAAAAAAAAAAAAAAAAAAAAA

    Poništi
  2. proslijedio/la je Tweet
    prije 19 sati

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  3. proslijedio/la je Tweet
    prije 15 sati

    BREAKING: Twitter says a suspected state-sponsored actor used its API to match usernames to phone numbers - Attack took place on December 24, 2019 - Twitter said attack came from IPs in Iran, Israel, and Malaysia

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Hawk's head stabilization

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    This Untitled Goose Game app turns your Windows PC into pure mayhem - The Verge

    Poništi
  6. proslijedio/la je Tweet

    SharePoint vulnerability CVE-2019-0604 from a year ago has been used to hack the UN. Three different UN agencies got owned, about 20 domain admin accounts accessed and implants on 40 servers. They didn’t disclose.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    About the security content of iOS 13.3.1 and iPadOS 13.3.1

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    "Social bots have influenced elections." Does it sound plausible? Yes. Is it scientifically founded? Not at all. Many mistakes were made in the research and a lack of review allowed an unfounded theory to spread around the world: 1/11

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    New research into REvil ransomware. This is totally out of control. - Over 150k unique infections demanding $38m in ransom in last few months. - The last 30 days have been most active yet.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    [PoC] MS-Windows Local Vulnerabilities Collection cve-2019-14969 cve-2019-5701 cve-2019-1378 cve-2019-12757 cve-2019-13382 cve-2019-13142 cve-2019-19248 cve-2019-0841 cve-2018-0952 cve-2019-5674 cve-2019-19363 cve-2019-1405 cve-2019-1322 CVE-2019-12758

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    Finally, the wait is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs: , Andrew Kwong, Daniel Genkin and

    Poništi
  13. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    Poništi
  15. proslijedio/la je Tweet
    20. sij

    Been waiting to announce: I'll be presenting "Forget the Sandbox Escape: Abusing Browsers from Code Execution" at this year's BluehatIL This talk will look at what attacks you can pull off in browsers without needing a sandbox escape I will also be demoing a POC of persistence

    Poništi
  16. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    10. sij

    Don’t ever get down on yourself, trillions of bacteria live on and inside your body, all dependent on you for survival. You’re a whole ecosystem you glorious bitch

    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.

    Here's a little-known secret: Twitter has a separate web form you can use to report abusive tweets. It's more cumbersome, but it allows you to submit more context for review, and provides you with a ticket number via email. I use it when I want followup.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    10. sij

    I just published "My First RCE (Stressed Employee gets me 2x bounty 🤑)"

    Poništi
  20. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·