Timo Hirvonen

@TimoHirvonen

Senior security consultant | Security Researcher | Redteamer | Public speaker (BlackHat, Infiltrate, HITB...) | Ghost in the Locks | Cold boot

Helsinki, Finland
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @TimoHirvonen

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TimoHirvonen

  1. Prikvačeni tweet
    17. pro 2019.

    I’m honored and super excited to present an entirely new approach to credential theft with my brilliant colleague a.k.a Roope Karhula at . In addition to open sourcing the tool, we’re working on One More Thing which you may find cool ;-)

    Poništi
  2. proslijedio/la je Tweet
    2. velj
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    I was today years old when I found out that has a note to self feature which also supports disappearing messages.

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  6. 30. sij

    Hadn’t seen this presentation before. Great read. Very inspiring ;-)

    Poništi
  7. 28. sij

    Just got a rejection email from Black Hat Asia 2020 😔... Well, sounds like a great opportunity to up our game ;-)

    Poništi
  8. proslijedio/la je Tweet
    25. sij

    Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"

    Poništi
  9. proslijedio/la je Tweet
    24. sij

    This is what happens when your Grandpa is a homicide detective and left to babysit 🤪🤦🏼‍♀️🤣

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Here's a cool trick to break out of AppLocker in Citrix environment: 1. Open a dummy RTF file in wordpad 2. Add ftp.exe as an object 3. Click to open ftp (or other similar apps) 4. ftp>!{commmand/app to run} for example: ftp>!cmd <-- blocked? ftp>!powershell <-- not blocked?:)

    Poništi
  11. proslijedio/la je Tweet
    24. sij

    Apple should spend some of their unlimited money hiring the MSDN technical writers to teach them how to do developer documentation

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    : Timo and Robert present ‘Let’s Get Physical’. 🥋 They’ll be discussing the evolution of credential theft and why you can’t expect a machine to do all the work for you - you need to play your part! ⚠️No consultants were hurt in the making of this talk.

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    The long-awaited Black Hat Go is releasing on 2/4/20! If your shipping address has changed since you ordered the book, please email info@nostarch.com. And if you haven't ordered the book yet, there's still time to get 30% off a preorder at !

    Poništi
  14. proslijedio/la je Tweet
    19. sij

    Now UEFI_RETool IDA plugin can display the sequence of execution of UEFI images and dependencies between images

    Poništi
  15. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  16. proslijedio/la je Tweet
    16. sij

    . is announcing a plan not only to become carbon negative, but to remove *all historical emissions* the company has created since its inception. Watch live: So inspiring and I sincerely hope this serves as a catalyst for others.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    15. sij

    Firmware attacks are on a fast trajectory and produce some of the highest impact threats. Security teams should prepare for a new set of attack strategies and vectors. Read Eclypsium’s Anatomy of a Firmware Attack:

    Poništi
  18. 15. sij

    A perfect summary of the Windows CryptoAPI spoofing vulnerability CVE-2020-0601 that Microsoft patched today. Like the old adage says, two screenshots are worth a thousand words.

    Tweet je nedostupan.
    Poništi
  19. proslijedio/la je Tweet
    13. sij

    We are hosting a 2-hour workshop at Disobey @ 14.2.2020 1245 about how to use and analyse data to identify attack paths in Active Directory environments with BloodHound. Good for both offense and defense.

    Poništi
  20. proslijedio/la je Tweet
    12. sij

    I’ve had a preview of this sweet sweet thing in prep for the briefing . Great work from & Rob . Let’s get physical this Valentines, from and with love 💕

    Poništi
  21. proslijedio/la je Tweet
    11. sij

    Disobey 2020 program is live!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·