Ramandeep

@ReverserRaman

Opinions are my own, not of my employers...

Dublin City, Ireland
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ReverserRaman

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ReverserRaman

  1. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  2. proslijedio/la je Tweet
    23. sij

    The critical flaw could give unauthenticated, remote attackers administrative privileges on vulnerable devices.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Security Advisory - Microsoft Guidance on Scripting Engine Memory Corruption - for more information please visit:

    Poništi
  4. proslijedio/la je Tweet
    21. sij

    We dove into vulnerability CVE-2019-19781 and found at least 700 affected systems and have outlined new Indicators of Compromise to help guard against the possibility of attacks. Post on our research here:

    Poništi
  5. proslijedio/la je Tweet

    , a zero weeks vulnerability with active exploitation across the globe (even my honeypot got owned, which is only a week old).

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    13. sij

    Cable Haunt: Researchers warn hundreds of millions of cable modems may be vulnerable to hijacking attack

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    CONFIRMED: Travelex is being held to ransom by hackers. Cyber criminals are holding the firm to ransom as all systems are down. Cashiers forced to use pen and paper. across thousands of sites. Met police leading investigation.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    New digital skimmer/ technique: steganography A colleague found this a couple of days ago while searching through our SIEM. The skimmer group uploads or modifies an existing image and appends the JS code. 1/5

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    For one year, we tracked the polymorphic threat Dexphot. Read our analysis and learn how we used behavioral blocking and containment to protect customers from the threat’s sophisticated persistence mechanisms, polymorphism, living-off-the-land techniques

    Poništi
  10. proslijedio/la je Tweet
    17. lis 2019.

    Things I didn't realize you could do with .URL files: [InternetShortcut] URL=javascript: ... Uploaded 1 hour ago:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  12. proslijedio/la je Tweet

    We have new tools we're excited to show off: GhIDA, an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, and Ghidraaas, a simple web server that exposes Ghidra analysis through REST APIs

    Poništi
  13. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. kol 2019.

    BREAKING: VMware buys Carbon Black and Pivotal, valued together at $4.8 billion

    Poništi
  15. proslijedio/la je Tweet
    17. kol 2019.

    "Webmin 0day remote code execution" Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan. PoC: /password_reset.cgi user=root&pam&expired&old=wrong | id

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    11. kol 2019.

    This was my most enjoyable research thus far: "Say Cheese - How I Ransomwared Your DSLR camera". How vulnerabilities in the Picture Transfer Protocol (PTP) allowed us to remotely take over digital cameras, infecting them with ransomware.

    Poništi
  17. proslijedio/la je Tweet
    24. srp 2019.

    About the "security issue" on : VLC is not vulnerable. tl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago. VLC since version 3.0.3 has the correct version shipped, and did not even check their claim. Thread:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    10. srp 2019.
    Poništi
  19. proslijedio/la je Tweet
    27. lip 2019.

    Newly discovered: a weakness in Microsoft that allows embedding of malicious payloads remotely.

    Poništi
  20. proslijedio/la je Tweet

    Our new research shows expanding its malware set with new backdoor and downloader, adding Nim coding to arsenal & launching new spearphishing attacks on central Asia, Middle East and Europe ⇒

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·