Tweets
- Tweets, huidige pagina.
- Tweets en antwoorden
- Media
Je hebt @ankit_anubhav geblokkeerd
Weet je zeker dat je deze Tweets wilt bekijken? @ankit_anubhav wordt niet gedeblokkeerd door Tweets te bekijken.
-
Vastgemaakte Tweet
There is a reason we chose to be on the challenging side and became whitehat. Let us never forget our motives. http://www.ankitanubhav.com/random.html pic.twitter.com/5SYg2z1Ds4
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Ankit Anubhav heeft geretweet
BLOG: @Sud0xD &@dileepjallepall deep dive in-the-wild Exploit Kit miner activity, exploring some lesser-known methods: https://www.fireeye.com/blog/threat-research/2018/06/rig-ek-delivering-monero-miner-via-propagate-injection-technique.html …
RIG Exploit Kit + various exploits
NSIS Loader + @Hexacorn's PROPagate process injection
Several anti-analysis techniquespic.twitter.com/U5qtNodmmy
Deze collectie tonenBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
It is good that most of the infosec is on Twitter and not Facebook, and I dont miss out a lot by not having a Facebook account. https://twitter.com/NinjaEconomics/status/1012174188751118336 …
Deze Tweet is niet beschikbaar.Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken
-
Wow, this is another level of
#IoT security fail. People getting CCTV feeds of other cameras instead of their own. "The BBC first learned of the problem on Saturday, when a member of its staff began receiving motion-triggered video clips from an unknown family's kitchen."https://twitter.com/Battwave/status/1003321850544508929 …
Deze collectie tonenBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
I wasted all day trying to fix my
#Chromecast , bricked my router and IPTV connection in frustration and now I see this. :/https://www.tomsguide.com/us/google-chromecast-home-outage,news-27518.html …Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Windows 98 system proudly running with SMB exposed as seen on Shodan. One needs special level of courage to do this!
#Respectpic.twitter.com/kWQppyO2ek
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Ankit Anubhav heeft geretweet
Some great, and terrifying, research by
@ankit_anubhav which it would have been remiss of me to omit.https://twitter.com/ankit_anubhav/status/1011970604986195968 …
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Was going through the book "Cyber Wars: Hacks that Shocked the Business World" and observed some of my research mentioned here. Thanks
@charlesarthur for covering ! One can get the book on Amazon here - https://www.amazon.com/Cyber-Wars-Hacks-Shocked-Business/dp/0749482001 … …pic.twitter.com/SHAGkSUXI0
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Ankit Anubhav heeft geretweet
DoS attacks are targetting
@ProtonMail . We have seen some SYN-ACK in our network telescope (SYN FLOOD). DDoSMon shows that NTP and CLDAP were also used for the amplified DRDoS. Good luck with the mitigation guys.https://twitter.com/ProtonMail/status/1011858507879145473 …Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
I love how the fact how infosec is debating about
#hackingback while@sS55752750 and@malwrhunterteam don't give a damn about it and are posting screenshots of desktops of cyber criminals and scammers xDBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Some IoT exploits are so basic that even tweet length is too big for them. CVE-2017-7577 [ UC-HTTPd Path Traversal vulnerability in multiple XiongMai cameras] is : "GET /../../../../../etc/passwd" . Yes, that's all. Already seen on honeypot logs.
#RipIOTsecurity#infosecBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Sandbox Party! Following
#shodan dork will give you cuckoo sandboxes which one can use to analyze malware. https://www.shodan.io/search?query=title%3A%22+Cuckoo+Sandbox%22+and++%22X-Cuckoo-Version%22 … NOTE : Using a sandbox without notifying the user is still unethical (probably illegal). Better to check with owner before you use them!#infosecpic.twitter.com/uZ7Tp0sRIF
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Ankit Anubhav heeft geretweet
@ankit_anubhav@VessOnSecurity I have created a collection of IDA/radare2 signatures for uClibc version often used in MIRAI based malwares. I hope they are usefull to someone :Dhttps://github.com/oliveriandrea/uclibc-sig …Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
How to take care of your sister who hasn't prepared well for her exam? Ask botnet operators to DDoS IP of the school so the online exam server breaks down. Well that's a caring brother, but DDoS is still illegal. To study and pass exams might be a better way.
#iot#DDoSpic.twitter.com/WaATQPkJ2Q
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Lol. Hakai C2 server is also hosting my Twitter profile picture now. Thanks for notifying
@IridiumXORpic.twitter.com/bGmp2BXGur
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Hakai
#IoT#botnet trolling researchers. The C2 hakaiboatnet(.)pw says "If you are a researcher, visit /hacker page." When you visit it, you get "/youcantfindmybinsyoufu*kingb*tch" instead of the binary payloads :(#infosec#cybersecurity#Hackingpic.twitter.com/zKHH6D62UZ
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
And now when I google port 8584 I get more articles related to the crypto hack, due to cross reporting. Poor port 8584 is that person who gets indicted in a crime someone else did lol. (2/2)https://twitter.com/ankit_anubhav/status/1008239183708807169 …
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
This is incorrect (probably typo) . The port exploited here is 8545 and not the one mentioned in this article. Being a blog author myself, I am last to criticize writings, but such wrong information can lead to people searching/investigating on wrong ports. (1/2)https://twitter.com/techpearce3/status/1008095603350437888 …
Bedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
This is also independently observed by
@360Netlab who have promised to publish a blog on this. Looking forward to it. Also observed by@txalin GPON Party bug is over as stated before [ https://twitter.com/ankit_anubhav/status/1006828112544522240 … ] , hence attackers had to move to something new. (2/2)
Deze collectie tonenBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken -
Seeing fresh attacks of EDB-ID: 44760 (DLink). The exploit is 'GET /login.cgi?cli="Do whatever you want" Interestingly the IP 185 62 190. 91 involved in this exploit was seen exploiting the GPON party bug too (CVE-2018-10561). User agent is also same "Hello world" ! (1/2)pic.twitter.com/dcJtl507AH
Deze collectie tonenBedankt, Twitter gebruikt dit om je tijdlijn te verbeteren. Ongedaan makenOngedaan maken
Het laden lijkt wat langer te duren.
Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.