Ata Hakçıl

@ahakcil

Aka FlameOfIgnis & Ignis CTF Player @ excusemewtf & Security Enthusiast. Senior year student computer engineering student at METU.

Vrijeme pridruživanja: veljača 2018.

Tweetovi

Blokirali ste korisnika/cu @ahakcil

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ahakcil

  1. Prikvačeni tweet
    prije 21 sat

    Frustrating to lose the first place after holding it for 60+ hours! Seeing templeOS in an actual challenge was really funny though! I'd really tune down the guesswork though...

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    29. sij

    Interesting question: On a windows machine, is it safe to call a sub-process (another executable) without absolute path as system if you know your working directory is not writable by users?

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    While im already on the topic of windows services, here is a small windows binary to send service control requests.

    Poništi
  5. 29. sij

    While im already on the topic of windows services, here is a small windows binary to send service control requests.

    Poništi
  6. 29. sij

    Interesting question: On a windows machine, is it safe to call a sub-process (another executable) without absolute path as system if you know your working directory is not writable by users?

    Poništi
  7. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  8. 26. sij
    Prikaži ovu nit
    Poništi
  9. 26. sij

    ...Buna ek olarak elimdeki vakalardan sadece bana yanlış bir isim ile geldi, ve babamın ismi ile geldi. Kendi telefon numaramı kullanıp babamın ismini kullandığım sadece kargo var. Bu nedenle kesin bir şey söyleyemiyorum, fakat yüksek şüphem var.

    Prikaži ovu nit
    Poništi
  10. 26. sij

    ...Bu phishing SMS'indeki bilgiler bu iki şirketten birinden gelmiş gibi gözüküyor. SMS'i alan kişiler arasında ortak olan tek yer kargo gibi duruyor...

    Prikaži ovu nit
    Poništi
  11. 26. sij

    Görünüşe göre ya ya da en az isim, soyisim ve telefon numaralarının hedef olduğu bir data-breach yaşamış olabilir gibi duruyor. Elimdeki bilgi ile malesef kesin bir şey diyemiyorum. Bu şirketlerin geriye dönük tarama yapmasını tavsiye ederim.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. sij

    It's time to drop my DoS PoC for CVE-2020-0609 & CVE-2020-0610! Gonna make the scanner soon and then hopefully create a full RCE if possible :) Thanks to for the assistance!

    Poništi
  13. proslijedio/la je Tweet
    15. sij

    Here's a picture of CVE-2020-0601, don't forget to patch! Took some inspiration from :)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch

    Prikaži ovu nit
    Poništi
  15. 12. sij

    Just realised added how many people got each badge to the badges page. Proud to be the one of two people holding this one with 💪

    Poništi
  16. 9. sij

    This is a thing now? Here's mine: C: When i'm (failing at) writing an exploit. Python: When i'm automizing stuff. C++: When im working on a project i care about. Cuda: When i really need that performance. Js: When i need a backend. good backend. Java: Not a real language.

    Poništi
  17. proslijedio/la je Tweet
    8. sij

    Dear People-who-love-war, When are you signing up, Rambo? Also fuck you.

    Poništi
  18. 7. sij

    This madlad has been sending the link to his absolutely hideous phishing website via SMS. 🤦‍♂️ Message contains number owners name&surname. Website imitates lost&found desk and promises cheap phones. Owner's name was in the exif data of every image. cc

    Poništi
  19. 6. sij

    UPDATE: i ran the minimal wordlist with T0XIC wordrule (keyspace is 9.154.740.214.460 compared to 4M wlist with dive at 7.137.846.482.321.464) and recovered ~%10 of the previously uncracked turkish hashes i have.

    Prikaži ovu nit
    Poništi
  20. 6. sij

    I created a turkish wordlist and was testing it against uncracked 14% of a public dump from turkish website. Localization really makes the difference when cracking. Also please don't use your phone numbers as passwords....

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·