Tony Torralba

@_atorralba

Breaking builds and building breakages

Barcelona
Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @_atorralba

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_atorralba

  1. proslijedio/la je Tweet
    28. pro 2019.

    Hacemos público que llevamos varias semanas trabajando para un organismo de tipo estatal (que no podemos nombrar) haciendo labores de ingeniería inversa sobre la app de . El objetivo, hallar vulnerabilidades que permitan identificar a quienes forman parte de su red.

    Prikaži ovu nit
    Poništi
  2. 14. stu 2019.

    This is amazing!! I need to process the implications in my head because I see so much potential here. Can't wait to start testing it out and hopefully contribute to it!

    Poništi
  3. 24. lis 2019.
    Poništi
  4. proslijedio/la je Tweet

    at discussing how lack of security infrastructure allows you to connect to your neighbor´s wifi using just a power grid

    Poništi
  5. proslijedio/la je Tweet
    26. ruj 2019.

    Attending Amsterdam? will be talking about how to find and prevent entire classes of security vulnerabilities tomorrow.

    Poništi
  6. proslijedio/la je Tweet
    25. ruj 2019.

    💥🥊 "Convertir nuestra vulnerabilidad en la posibilidad de una estrategia de respuesta": Publicamos para su libre descarga "Resistencia Digital. Manual de seguridad operacional e instrumental para smartphones" ().

    Prikaži ovu nit
    Poništi
  7. 4. ruj 2019.

    . is so cool! It detected a Zip Slip vulnerability in BloodHoundAD which I tested and managed to exploit. It was quickly handled and fixed by , and here I am, happy to have been the middleman in all this!

    Poništi
  8. proslijedio/la je Tweet
    3. ruj 2019.

    Paste-Tastic! ft. - Google CTF 2019 Write-up Retweet if you liked it, Thanks :)

    Poništi
  9. proslijedio/la je Tweet
    27. kol 2019.

    Don’t forget that starts this friday 22:00UTC with his . Plenty of crackmes! This year with too! Be careful with mobile challenges ;) Register here:

    Poništi
  10. proslijedio/la je Tweet
    23. kol 2019.

    Question (since a lot of smart people follow me): What book / resource would you recommend for a junior/semi-advance person to learn about white-box side of pentesting / security research, especially on the web security side?

    Poništi
  11. proslijedio/la je Tweet
    19. kol 2019.

    . from security research team discovers 11 bugs in VLC. The most critical could be used to run arbitrary code on a victim's computer. Get details here:

    Poništi
  12. proslijedio/la je Tweet
    18. kol 2019.

    I was trying to figure out how that Webmin RCE (CVE-2019-15107) works by tracing code of their GitHub repository. Couldn't figure it out. On /r/netsec someone figured it finally out, the source on GitHub is not vulnerable, only the one at sourceforge. Diff of password_change.cgi

    Prikaži ovu nit
    Poništi
  13. 30. srp 2019.

    This is some cool swag! Thank you !!

    Poništi
  14. proslijedio/la je Tweet
    26. srp 2019.

    Félicitations on your talk, "History of the worst Android app ever: mAadhaar" being accepted to the 1st ever AppSec Village . Safe travels to

    Poništi
  15. 22. srp 2019.

    ...And I think it's done! With *huge* help from (thank you 3000!), I managed to finish the QL query that shows a path from fopen to alloca that could turn into a buffer overflow. Amazing challenge! Next step: start using QL to find real-world bugs :)

    Prikaži ovu nit
    Poništi
  16. 14. srp 2019.

    I have the feeling I'm making a bit of a mess to solve 's CTF challenge (), but I think I'm halfway there...

    Prikaži ovu nit
    Poništi
  17. 24. lip 2019.

    This year, we gathered a team of amazing people from and participated in 2019. Besides having lots of fun, I wrote this walkthrough of one of the few challenges we managed to solve: "Bob Needs a File".

    Poništi
  18. 20. lip 2019.

    The series continues! This time, my colleagues and cover Execution techniques using Powershell. Great job guys!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. lip 2019.

    Call for papers for the first ever AppSec Village is open! Share your knowledge at

    Poništi
  20. 12. lip 2019.

    . 's detective tutorials are so fun! A great way to introduce the tool and its possibilities to people with 0 prior knowledge about it. Definitely worth a shot if you are into code review/source code analysis!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·