Sandeep Reddy

@SandeepNare

Security Researcher

Banglore
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @SandeepNare

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SandeepNare

  1. proslijedio/la je Tweet
    5. velj
    Poništi
  2. proslijedio/la je Tweet
    6. sij

    Breaking PHP's mt_rand() with 2 values and no bruteforce

    Poništi
  3. proslijedio/la je Tweet
    10. pro 2019.

    Relasing the courseware for my ~decade old training on and It all started at Delhi. Made so many friends :)

    Poništi
  4. proslijedio/la je Tweet
    4. stu 2019.

    After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems. More details at Joint work with Takeshi Sugawara, Benjamin Cyr, Daniel Genkin, and

    Poništi
  5. proslijedio/la je Tweet
    4. stu 2019.

    During bug hunting on Antivirus products, I found another vulnerability which is DLL Hijacking that leads to Elevation of Privilege on Windows Service Host. Reported to MSRC and they decided not to fix it. A quick write-up:

    Poništi
  6. proslijedio/la je Tweet
    21. lis 2019.

    Shikata Ga Nai payload encoding is used extensively by red teams and threat groups, and it's available through popular exploit frameworks like Metasploit. , and myself just released a blog about how SGN works, detection methods and threat group usage.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    21. lis 2019.

    Ransomware Gang's Victim Cracks Their Server and Releases All Their Decryption Keys : Pastebin containing 2,858 decryption keys : Also check back --> cc

    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. proslijedio/la je Tweet
    11. lis 2019.

    Active Directory Open to More NTLM Attacks - Drop The MIC 2 (CVE 2019-1166) & Exploiting LMv2 Clients (CVE-2019-1338) work by & :

    Poništi
  10. proslijedio/la je Tweet
    8. lis 2019.

    exploit CVE-2019-0708(BlueKeep) on XP&server 2003 based on rdesktop: The method is pretty much similar to metasploit's EXP.However on XP NonPagedPool can be allocated directly through MS_T120 so do not need RDPSND.

    Poništi
  11. proslijedio/la je Tweet
    9. lis 2019.

    Multiple D-Link Routers Found Vulnerable To Unauthenticated Remote Code Execution (will remian unpatched due to EOL) :

    Poništi
  12. proslijedio/la je Tweet
    8. lis 2019.

    Windows Error Reporting privilege escalation (CVE-2019-1315) Fixed in October updates

    Poništi
  13. proslijedio/la je Tweet
    27. ruj 2019.

    We won the first place in the category . Kudos to the team and the creators of the CTF environment! It was good fun :)

    Poništi
  14. proslijedio/la je Tweet
    12. ruj 2019.

    Introducing VyAPI - The Modern Cloud-Based Vulnerable Hybrid App! by Practice auditing mobile apps with Amazon Cognito as the Identity Provider

    Poništi
  15. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. kol 2019.

    Are you new in or studying infosec? A lovely anonymous donor just gave us four one-month subscriptions so we're matching them! There are eight one-month subscriptions up for grabs! First in, first serve! RT and tell a friend! ^^

    Prikaži ovu nit
    Poništi
  17. 18. srp 2019.

    Windows Kernel Debugging & Exploitation Part1 – Setting up the lab

    Poništi
  18. proslijedio/la je Tweet
    15. lip 2019.

    Oracle WebLogic Deserialization RCE Alert Again!!! Bypass CVE-2019-2725!!! Temporary Solution can refer to CVE-2019-2725's warning

    Poništi
  19. proslijedio/la je Tweet
    15. lip 2019.

    600 Million Unique Clear-text Passwords Accompanied By Various Hashes : cc

    Poništi
  20. proslijedio/la je Tweet
    9. svi 2019.

    Naked Security | CSS tracking trick can monitor your mouse without JavaScript

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·