Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @S0CF0X
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @S0CF0X
-
S0CF0X proslijedio/la je Tweet
email: "I got ransomware" Gmail suggested response: "I'm so proud of you!"
pic.twitter.com/zM6Pahhuot
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
S0CF0X proslijedio/la je Tweet
An attacker sends a phishing email posing as infosec staff...pic.twitter.com/N67h7ryROm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Strong opinion: My first SOC/IR role was with a mid-sized company that was all about defense in depth. When I wasn't responding, I was tuning the SIEM, FW, spamfilter, or WAF. If you rely on your endpoints to alert, the attack has already made it farther than it should've.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
CVE-2020-0601 : Read
@moxie's SSL And The Future Of Authenticity https://moxie.org/blog/ssl-and-the-future-of-authenticity/ … Though in this case it's not a rogue CA, but a Windows flaw that allows a certificate to claim to be issued by a CA that it wasn't. HTTPS spoofing is *one* example. Use your imagination here.pic.twitter.com/YSPnY7HYyh
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
[I just can't believe I'm writing this tweet while touching my nipples] Hi
@NSAGov , A security issue has been found in one of your "project". How can I report this issue to you? Regards,Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
To those who perform vulnerability scans and call them penetration tests you are unethical. Stop damaging our profession and selling a false sense of security just so companies can check a regulatory box. It is blatant fraud. Sincerely, A hacker who gives a shit
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
I wish AD was in scope for bug bounty.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Try my tool EmailGen, google dork on bing :) it works!https://github.com/navisecdelta/EmailGen …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Update. It would be fun to endlessly make fun of Krugman after this, but we have massive problems in computing and finance with scam victims not coming forward to get help out of fear and shame. You want users to feel safe to call IT after realizing they were tricked.https://twitter.com/paulkrugman/status/1215080448113725441 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Actually anything that represents a gun has to be checked in while in person of you. Flare guns and cheap pellet or plastic replica guns work fine. I used this once to preserve chain of custody for a server and NAS drives.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
TSA requires that gun cases remain locked post-inspection for the duration of travel, locked with a lock only you (and not TSA) has a key for. Further, any case with a gun is practically escorted through the airport after being checked because it can NOT be lost. Odd
#lifehackPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
CVE's are like a girlfreind. I dont have one
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
- Most shared url, photos, videos This is not magic. Get the identity of people behind the accounts is difficult and only Twitter can take them down. BUT These guys hate light. The misinformation is working when it’s done in the shadows. Expose how they are organized is (...)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
It’s time to expose these losers. My
#Indian friends, which hashtags should I listen?https://twitter.com/fs0c131y/status/1214169807819591687 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Honestly, without your research and tools being released I don't think Microsoft would have ever created Credential Guard, Protected Processes, etc. Very happy to see security evolve over the years directly due to your research to help protect end users in the long run! :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Walking around a grocery store on the other side of the world and my phone decides to jump on a random washing machine’s access point because it’s broadcasting the same default SSID as the one at home. Welcome to the year 2020!pic.twitter.com/Hq4uhAOfYs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
My 2019 recap: - Discovered RCE in EA's Origin client. - Discovered another RCE in EA's Origin client. - Discovered a code execution bug in KDE that's been dormant for ~16yrs. - Discovered an XXE vulnerability in software used by the Federal Reserve.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
Normal people: "Happy New Year!" Me: "There's a bunch of apps about to have issues because someone regexed "20" out of the date."
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S0CF0X proslijedio/la je Tweet
An attacker logged into the RDP Honeypot a few weeks ago and was able to dump credentials and move laterally in 36 minutes. They used Advanced Scanner + ProcDump + PsExec to move laterally to a Domain Controller. Would you have detected and responded...https://www.wilbursecurity.com/2019/12/from-zero-to-lateral-movement-in-36-minutes/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.