Tweetovi

Blokirali ste korisnika/cu @_mabote_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_mabote_

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    L'équipe Synacktiv vous attend sur le pavillon Bretagne !

    Poništi
  3. proslijedio/la je Tweet

    Lucas sends us off in style. He was able to demonstrate his RCE in the Rockwell Automation FactoryTalk View SE with no difficulties. We're headed back to the disclosure room one last time for Miami 2020.

    Poništi
  4. proslijedio/la je Tweet
    20. sij
    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Naughty kid! Your Christmas gift is made to fly, not to be torn apart!

    Poništi
  6. proslijedio/la je Tweet
    10. sij

    Friday night trivia: can you recognize this legendary mistake?

    Poništi
  7. proslijedio/la je Tweet
    10. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    With Purplemet you can easily and quickly spot vulnerable and use CVE-2018-17246 / CVE-2019-7609 exploit chain by from .

    Poništi
  10. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    20. pro 2019.

    Here is our write-up of the prequals CTF organized by ! Congratulations to and !

    Poništi
  12. 20. pro 2019.

    Just released a new article about pwning an outdated Kibana by combining CVE-2018-17246 and CVE-2019-7609. See you on 's blog . Enjoy!

    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    "Hey la Kibana, Inspection des gadgets !" 😋 Pwning Kibana 6.2 using prototype pollution and CVE-2018-17246 by

    Poništi
  14. proslijedio/la je Tweet
    11. pro 2019.

    Our team-members and will talk about "Modern PHP Security" at If you're interested in SSRF, SSTI, arbitrary instantiation, disabled_functions / open_basedir bypasses and other pitfalls, let's catch up in Vienna!

    Poništi
  15. proslijedio/la je Tweet
    16. stu 2019.

    A look inside Raspberry Pi hardware decoders licenses by ! That’s on page 43 of !

    Poništi
  16. proslijedio/la je Tweet
    13. stu 2019.

    It is worse than I’ve thought initially! 🤦‍♂️ If you simply rename your malicious .exe file to msiexec.exe its files will be excluded from realtime scanning. REALLY ? Simple C# dropper and the eicar-based PoC instruction:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    8. stu 2019.

    LOAD DATA LOCAL strikes again with help of , this time in nodejs' mysql package 🧐

    Poništi
  18. proslijedio/la je Tweet
    7. stu 2019.

    A new challenge on - the fantastic platform to learn and sharpen your skills in !

    Poništi
  19. proslijedio/la je Tweet
    22. lis 2019.

    How a Binder security feature breaks ACL in the Hardware ServiceManager (by ):

    Poništi
  20. proslijedio/la je Tweet

    On Twitter, if you blink at the wrong moment you'll miss some great web security research. We recently launched a quality-over-quantity subreddit to help address this:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·