Alejandro Parodi

@SecSignal

CTO & CISO at SecSignal & Sr. Security Consultant, Exploit Writer & Passionate about new technologies.

Argentina
Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @SecSignal

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SecSignal

  1. proslijedio/la je Tweet
    4. velj

    Last year, researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    It's the year 2020, and we're still finding buffer overflows in programs written in C. Fortunately, those programs are only esoteric, rarely installed programs like... <checks notes> sudo.

    Poništi
  3. proslijedio/la je Tweet
    31. sij
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)

    Poništi
  5. proslijedio/la je Tweet
    29. sij
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Ya estamos en la nueva edición de Digital Summit

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Working on a startup feels like

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  12. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  13. proslijedio/la je Tweet
    24. pro 2019.

    Queremos enviarles los mejores deseos ✨ y que pasen unas felices fiestas a todos nuestros clientes, amigos, colaboradores y compañeros 💙

    Poništi
  14. proslijedio/la je Tweet
    14. pro 2019.

    Gracias a todos los que vinieron a nuestro evento 💥 nos vemos en una próxima edicion de

    Poništi
  15. proslijedio/la je Tweet
    14. pro 2019.

    organizadores, hasta el próximo año

    Poništi
  16. proslijedio/la je Tweet
    14. pro 2019.

    Last community meetup of 2019! Grateful to be able to partner with local hackers like to help power events like this! ❤️ all the collaboration, education, and community building!

    Poništi
  17. 14. pro 2019.

    Cabros, esto no prendió!

    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.

    Mañana🎉 Esperamos verlos ahí y compartir un rato🍻

    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    11. pro 2019.

    Nos vemos en 3 días💥 No se olviden que vamos a comenzar a las 11:30 AM con las acreditaciones!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·