Tweetovi

Blokirali ste korisnika/cu @antyurin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @antyurin

  1. Prikvačeni tweet
    20. stu 2017.

    All info about TLS Redirection / Virtual Host Confusion attacks and my presentation about new attack techniques

    Poništi
  2. 20. sij

    This year I have two researches "Bypassing SOP Using the Browser Cache" and "Reverse proxies & Inconsistency" at the nomination list for Top 10 web hacking techniques of 2019. Vote for them! ahaha! Especially, for SOP bypass ^_^

    Poništi
  3. 17. sij

    It's interesting if any SAML libs (which rely on Windows CryptoAPI) are vulnerable to auth bypass due to CVE-2020-0601?

    Poništi
  4. 15. sij

    It's so funny to find high risk vulns just by looking at documentation

    Poništi
  5. proslijedio/la je Tweet
    14. sij

    We need your help to select the top 10 web hacking techniques of 2019! Cast your vote here:

    Prikaži ovu nit
    Poništi
  6. 3. sij

    I Was Google’s Head of International Relations. Here’s Why I Left. by

    Poništi
  7. proslijedio/la je Tweet
    12. pro 2019.

    Если у вас есть checkmarx и вы ещё не пробовали писать в нем запросы, самое время попробовать!

    Poništi
  8. 12. stu 2019.

    It was a very cool talk! Useful attacks on RMI, JMX, CORBA

    Poništi
  9. 12. stu 2019.

    Found an interesting project for e-learning about practical offensive/defensive security

    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    Ну что, по традиции начнём розыгрыш проходки на от шайки DC8800? Нужно лайкнуть И ретвитнуть этот пост. Через 12 часов (или чуть больше)мы запустим рандомизатрщину среди участников рулетки

    Poništi
  11. proslijedio/la je Tweet
    7. stu 2019.

    Announcing Web Village: Aleksei "GreenDog" Tiurin "From misconfigs to severe consequences" 2019

    Poništi
  12. proslijedio/la je Tweet
    31. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi
  14. proslijedio/la je Tweet
    22. lis 2019.

    Here is the news we’ve all been waiting for – the program of the conference is finally published! Please RT!

    Poništi
  15. proslijedio/la je Tweet
    9. ruj 2019.

    We invite professional communities, hackspaces, projects, forums, and chats to participate in the conference. ZeroNights welcomes new people, additions to the program, and competitions. We are always open to cooperation and interaction! Contact us: partners@zeronights.org

    Poništi
  16. 21. kol 2019.

    Pre-auth IDOR

    Poništi
  17. proslijedio/la je Tweet
    11. kol 2019.

    I’m suprised that CVE-2018-13382 (a trivial « backdoor » in Fortigate SSL VPN) didn’t get much attention, even after ´s talks in Vegas...

    Poništi
  18. proslijedio/la je Tweet
    2. kol 2019.

    2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! Please RT!

    Poništi
  19. proslijedio/la je Tweet
    24. srp 2019.

    Как готовят пентестеров? Разбор вступительных испытаний для стажеров Digital Security. Или о том, как попадали на в 2019 году.

    Poništi
  20. proslijedio/la je Tweet
    25. srp 2019.

    I did a quick research of how Apple BLE (Apple Continuity) works. So, yeah, now I can find out who sends weird pictures via AirDrop while I commuting

    Poništi
  21. proslijedio/la je Tweet
    25. srp 2019.

    We are glad to introduce style for 2019. at it's best. Stay tuned!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·