Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_bka_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_bka_
-
Bk proslijedio/la je Tweet
USB-C Transfers Slow? The fix might be easy! Hint: It's upside-downhttps://www.pscp.tv/w/cQR7QDg3NDM3OTJ8MU1ZeE5rclFrQVZLd9wI5_jgqNbdEDLX2mWzKOd2KYNCOIutlLxkBMTkWlVy …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
this was the funniest shit at 2 am, if you play Skyrim you know, you just know
pic.twitter.com/uLDwzqmow3Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Network Security Implications of Host Modelshttps://blog.kanbach.org/post/network-security-implications-of-host-models …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Am 25.11 geht es weiter mit
@_bka_ und einem interaktiven Windows Breakout Training im@chaospott in Essen. Alle infos gibt es unter http://meetu.ps/e/H2zbl/KVjcQ/d .@OWASP_deHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,https://gist.github.com/hfiref0x/de9c83966623236f5ebf8d9ae2407611 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
CVE-2019-14287
A flaw in Sudo—that comes installed on almost every #Linux OS—could let users run commands as "root" even when they're restricted. Details ➤ https://thehackernews.com/2019/10/linux-sudo-run-as-root-flaw.html … How? Just by specifying user ID "-1" or "4294967295" in the command instead of the root.pic.twitter.com/zlvC7PSYrI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's this time of the year again
#BruCON0x0B Just arrived in GhentHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Bk proslijedio/la je Tweet
I am so incredibly excited to announce the release of Recon-ng v5!!! Hosted on Github, upgraded to Python 3, a module marketplace, updated docs, new command interface, plus much more. See the wiki for info. https://github.com/lanmaster53/recon-ng …
#reconngHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Short blog and POC code for CVE-2019-1040 (patched last Tuesday). Combining this vulnerability with the SpoolService bug and Kerberos delegation means: any AD user to Domain Admin; RCE on unpatched hosts; possible over Forest trusts. https://dirkjanm.io/exploiting-CVE-2019-1040-relay-vulnerabilities-for-rce-and-domain-admin/ … TL;DR: GO PATCH!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
I’m glad to annonce the release of my blog post! I’m tried to explain how AMSI is working and how it is possible to bypass AMSI.https://twitter.com/CTXIS/status/1138761874353401859 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Rough draft MSF module. Still too dangerous to release, lame sorry. Maybe after first mega-worm?
PATCH #BlueKeep CVE-2019-0708
35c2571801b3b6c4297ed362cf901dc4e907ff32a276fb6544a2b9d0f643f207pic.twitter.com/y0g9R9HNncHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Analysis of CVE-2019-0708 (BlueKeep)https://www.malwaretech.com/2019/05/analysis-of-cve-2019-0708-bluekeep.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The CVE-2019-0708 detection module for Metasploit was just pushed upstream. Do a 'msfupdate' now and try 'use auxiliary/scanner/rdp/cve_2019_0708_bluekeep'. Thanks
@zerosum0x0 and JaGoTu for your effortsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Our ATR team is sharing their analysis of the wormable RDP Vulnerability CVE-2019-0708, where RDP stands for “Really DO Patch!”https://mcafee.ly/2JsSsF6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
In February I found a security vulnerability in HiDrive. HiDrive is distributed by at least three big providers in Germany such as 1&1, Telekom, Strato. This blog post explains how I was able to escalate user privileges to SYSTEM by abusing a WCF endpoint. https://zer0-day.pw/articles/2019-04/HiDrive-LPE-via-Insecure-WCF-endpoint …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
@consorsbank why exactly is it possible for the customer support to verify my authenticity using 2 of the characters of my online banking account? I believed, in the year 2019, we're saving credentials in a safe way (i.e. using a hash function/bcrypt)?Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
As Rob points out, src port 53 does indeed reveal almost 1 million host difference scanning all IPv4 space, just not in the direction we expected Side A - Src Port < 1024: Found 2034432 UDP http://portradar.packet.tel/packet.tel.03212019.tcpudp.53.sideA.tar.gz … Side B - Src Port 53: Found 1190639 UDP http://portradar.packet.tel/packet.tel.03212019.tcpudp.53.sideB.tar.gz …pic.twitter.com/YAhbmN1z0N
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Christopher Vella will be presenting his talk on EDR Internals and Bypasses at
#Nullcon2019 this Friday! Find out more: https://okt.to/3tjRld pic.twitter.com/dTXARZw0nE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bk proslijedio/la je Tweet
Der heimliche Star des Chaos Communication Congress
#35c3 in Leipzig: Der Chaostreff Recklinghausen@c3_RE mit seinem vollautomatischen Cocktail-Mixer aus dem 3D-Drucker https://www.golem.de/print.php?a=138927 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.