Tweetovi

Blokirali ste korisnika/cu @S0CF0X

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @S0CF0X

  1. proslijedio/la je Tweet
    20. sij

    email: "I got ransomware" Gmail suggested response: "I'm so proud of you!" 😆

    Poništi
  2. proslijedio/la je Tweet
    17. sij
    http://poblacht-na-n-oibrithe.tumblr.com/post/181316627183
    Poništi
  3. proslijedio/la je Tweet
    17. sij

    An attacker sends a phishing email posing as infosec staff...

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Strong opinion: My first SOC/IR role was with a mid-sized company that was all about defense in depth. When I wasn't responding, I was tuning the SIEM, FW, spamfilter, or WAF. If you rely on your endpoints to alert, the attack has already made it farther than it should've.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 : Read 's SSL And The Future Of Authenticity Though in this case it's not a rogue CA, but a Windows flaw that allows a certificate to claim to be issued by a CA that it wasn't. HTTPS spoofing is *one* example. Use your imagination here.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    8. sij

    [I just can't believe I'm writing this tweet while touching my nipples] Hi , A security issue has been found in one of your "project". How can I report this issue to you? Regards,

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    8. sij

    To those who perform vulnerability scans and call them penetration tests you are unethical. Stop damaging our profession and selling a false sense of security just so companies can check a regulatory box. It is blatant fraud. Sincerely, A hacker who gives a shit

    Poništi
  8. proslijedio/la je Tweet
    8. sij
    Odgovor korisniku/ci

    I wish AD was in scope for bug bounty.

    Poništi
  9. proslijedio/la je Tweet
    9. sij
    Odgovor korisniku/ci

    Try my tool EmailGen, google dork on bing :) it works!

    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Update. It would be fun to endlessly make fun of Krugman after this, but we have massive problems in computing and finance with scam victims not coming forward to get help out of fear and shame. You want users to feel safe to call IT after realizing they were tricked.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. sij
    Odgovor korisnicima

    Actually anything that represents a gun has to be checked in while in person of you. Flare guns and cheap pellet or plastic replica guns work fine. I used this once to preserve chain of custody for a server and NAS drives.

    Poništi
  12. proslijedio/la je Tweet

    TSA requires that gun cases remain locked post-inspection for the duration of travel, locked with a lock only you (and not TSA) has a key for. Further, any case with a gun is practically escorted through the airport after being checked because it can NOT be lost. Odd

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    6. sij

    CVE's are like a girlfreind. I dont have one

    Poništi
  14. proslijedio/la je Tweet
    6. sij

    - Most shared url, photos, videos This is not magic. Get the identity of people behind the accounts is difficult and only Twitter can take them down. BUT These guys hate light. The misinformation is working when it’s done in the shadows. Expose how they are organized is (...)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. sij

    It’s time to expose these losers. My friends, which hashtags should I listen?

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. sij
    Odgovor korisnicima

    Honestly, without your research and tools being released I don't think Microsoft would have ever created Credential Guard, Protected Processes, etc. Very happy to see security evolve over the years directly due to your research to help protect end users in the long run! :)

    Poništi
  17. proslijedio/la je Tweet
    2. sij

    Walking around a grocery store on the other side of the world and my phone decides to jump on a random washing machine’s access point because it’s broadcasting the same default SSID as the one at home. Welcome to the year 2020!

    Poništi
  18. proslijedio/la je Tweet
    31. pro 2019.

    My 2019 recap: - Discovered RCE in EA's Origin client. - Discovered another RCE in EA's Origin client. - Discovered a code execution bug in KDE that's been dormant for ~16yrs. - Discovered an XXE vulnerability in software used by the Federal Reserve.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    31. pro 2019.

    Normal people: "Happy New Year!" Me: "There's a bunch of apps about to have issues because someone regexed "20" out of the date."

    Poništi
  20. proslijedio/la je Tweet
    29. pro 2019.

    An attacker logged into the RDP Honeypot a few weeks ago and was able to dump credentials and move laterally in 36 minutes. They used Advanced Scanner + ProcDump + PsExec to move laterally to a Domain Controller. Would you have detected and responded...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·