Alexander Stone

@alexanderstonec

Professional In IT Security, Full-stack Developer, Security Researcher&Blogger Co-Creator .com I Always trying to build something :)

Cochin, Kerala
Vrijeme pridruživanja: svibanj 2018.

Tweetovi

Blokirali ste korisnika/cu @alexanderstonec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alexanderstonec

  1. Prikvačeni tweet
    15. lis 2019.

    Complete Penetration Testing & Hacking Tools List for Hackers & Security Professionals via

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Active DDoS malware payload detected: http://45.10.90.89/z arm arm5 arm6 arm7 () mips () mpsl sh4 x86 Exploit attempt source IP: 45.10.90.89 (🇺🇦) Targeted ports: 5269/tcp 8089/tcp 8090/tcp 8291/tcp 9002/tcp

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    [PoC] MS-Windows Local Vulnerabilities Collection cve-2019-14969 cve-2019-5701 cve-2019-1378 cve-2019-12757 cve-2019-13382 cve-2019-13142 cve-2019-19248 cve-2019-0841 cve-2018-0952 cve-2019-5674 cve-2019-19363 cve-2019-1405 cve-2019-1322 CVE-2019-12758

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  4. proslijedio/la je Tweet
    29. sij
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    [webapps] Kibana 6.6.1 - CSV Injection

    Poništi
  6. proslijedio/la je Tweet
    26. sij

    An excellent talk by : clear methodology, novel bugs and interesting links 💯

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Modern Malware Deobfuscation, Emulation and Rootkits - Alexandre Borges ... via

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    Interpol arrested 3 -style Indonesian hackers who compromised hundreds of International e-commerce websites and stole their users' payment card details by implanting JS-sniffers.

    Poništi
  9. proslijedio/la je Tweet
    24. sij
    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Open Wifi Security (Friday evening rant) 1) Yes, at our hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to. Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. sij
    Poništi
  12. proslijedio/la je Tweet
    22. sij
    Poništi
  13. proslijedio/la je Tweet
    20. sij
    Poništi
  14. proslijedio/la je Tweet

    OK Bay Area infosec, which one of y'all did this? Fess up....

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  16. proslijedio/la je Tweet
    18. sij
    Poništi
  17. proslijedio/la je Tweet
    18. sij

    Big list of HTTP static server one-liners :

    Poništi
  18. proslijedio/la je Tweet
    17. sij

    Added support for MonetDB

    Poništi
  19. proslijedio/la je Tweet
    17. sij

    If you have AppLocker deployed, be aware that most times when Windows 10 is updated/upgraded, it creates a TASKS_MIGRATED folder under C:\windows\system32 that has the CREATOR OWNER, meaning that users can create and execute files from the folder and bypassing AppLocker 😱

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    17. sij

    For every 3 sane Linux admins, there's one who just insists on chmod 777'ing everything. "It just works."

    Poništi
  21. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·