Alexandre Dulaunoy

@adulau

Enjoy when human are using machines in unexpected ways. I break stuff and I do stuff.

Europe
Vrijeme pridruživanja: lipanj 2008.

Tweetovi

Blokirali ste korisnika/cu @adulau

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @adulau

  1. prije 11 sati

    In November 2015, we designed (in a cafe in Bruxelles) a simple JSON format to solve the use of unstructured tags in MISP (mainly for the TLP classification). Today, we have 112 public taxonomies to support a wide range of use-cases in sharing communities.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    /8 Choose carefully your black felt if you want to mask sensitive data... Material: defiltered EOS 50D + 950nm filter + 850nm light

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    We ( and from ) will be at the FIRST Cyber Threat Intelligence Symposium in Zurich (9-11 March) to talk about "Turning Data into Actionable Intelligence - Advanced Features in MISP Supporting Your Analysts and Tools"

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    We published a clarification on our website in regards to the use of AGPL as it pertains to the MISP core software.

    Poništi
  5. 3. velj

    Weiner's Law of Libraries: «There are no answers, only cross references » after a long read of computer security papers.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    AIL Framework version 2.9 released with a critical security fix (CVE-2020-8545) and minor bugs fixed. We strongly recommend everyone to upgrade asap. cc

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Do you have an open-source cybersecurity project you would like to see being worked on as part of Google Summer of Code? We are collecting ideas & projects for this summer! Submit yours here (even if you wouldn't be able to be a mentor): !

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    1. velj

    1\ Malware sandboxes are useful but extremely limited. Here's a malware call graph, and in red are the functions the malware actually *executed* when run in a sandbox -- a miniscule fraction of the malware's potential badness!

    Prikaži ovu nit
    Poništi
  10. 2. velj

    I discovered the work of (thx to ) at with his passion for antique hardware and his craziness about quantum computing. Obviously you should follow his work with

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    Systems patched for Citrix -2019-19781 may still be compromised. See 's latest Activity Alert at for procedures for detecting a compromise.

    Poništi
  13. proslijedio/la je Tweet
    31. sij
    Odgovor korisniku/ci

    I have two in my name just in case.

    Poništi
  14. 31. sij

    « La nuit qui vient » de est surement une lecture que tout le monde devrait lire pour approcher l’humanisme qui devrait transparaître dans nos sociétés.

    Poništi
  15. 31. sij

    If you have no clue while doing a cyber cyber cyber presentation, always add a random triangle and you'll always be right.

    Poništi
  16. 31. sij

    It’s kind of depressing to listen about anti-European feelings because of Brexit in a train commute between Belgium and Luxembourg. I think we never learn.

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    I've spent a whole day on Sigma Focus: Facilitate contributions - New Rule Creation Guide - New colorised test output - New test cases - Rule cleanup (title, date, ids) Next step: How-to guide for pull requests

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Wish more ISACs shared via MISP rather than commercial TIPs or email distros.

    Poništi
  19. 26. sij

    I will be at next week if you want to discuss about open source security or even threat intelligence. Booth G10

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·