Tweetovi

Blokirali ste korisnika/cu @artsploit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @artsploit

  1. Prikvačeni tweet
    10. kol 2019.

    Apache Solr Injection whitepaper is now available at Thanks everyone who attended my talk!

    Poništi
  2. proslijedio/la je Tweet

    The final count is in, and with 92.5 points total, and are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.

    Poništi
  3. proslijedio/la je Tweet

    Up next and making his debut, Michael Stepankin () of Veracode will be targeting a remote code execution with continuation against the Inductive Automation Ignition in the Control Server category.

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  5. proslijedio/la je Tweet
    14. sij

    Voting is now open for the top 10 new web hacking techniques of 2019:

    Poništi
  6. proslijedio/la je Tweet
    12. sij

    Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)

    Poništi
  7. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    30. lis 2019.

    PoC for Kubernetes CVE-2019-16276 "X-Remote-User[space]:[space]admin"

    Poništi
  9. 30. lis 2019.

    This man certainly knows his stuff, a new RCE in Solr

    Poništi
  10. proslijedio/la je Tweet
    19. ruj 2019.

    Want to enhance your http smuggling knowledge? I just published details of CVE-2018-8004 (August 2018 - Apache Traffic Server).

    Poništi
  11. proslijedio/la je Tweet
    22. kol 2019.

    New blog post on an iMessage bug that allows files to be read off an iPhone remotely!

    Poništi
  12. proslijedio/la je Tweet
    14. kol 2019.

    Backslash Powered Scanner can now detect proxy subfolder escapes using 's path normalization research from last year - just enable 'experimental folder attacks'.

    Poništi
  13. proslijedio/la je Tweet
    12. kol 2019.

    The research that presented at Defcon is really cool. It includes a way to detect and exploit these injections, but also a taxonomy of known Solr exploits 💯

    Poništi
  14. proslijedio/la je Tweet
    10. kol 2019.
    Poništi
  15. proslijedio/la je Tweet
    7. kol 2019.
    Poništi
  16. proslijedio/la je Tweet
    7. kol 2019.

    Attacking Unmarshallers :: JNDI Injection using Getter Based Deserialization Gadgets thanks to for the inspiration!

    Poništi
  17. proslijedio/la je Tweet
    7. kol 2019.

    Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich () -

    Poništi
  18. proslijedio/la je Tweet
    1. kol 2019.

    Struggling to exploit H2 DB? This may help: we found a new way utilizing native libraries and JNI. Kudos to

    Poništi
  19. 22. srp 2019.

    Sick technique to achieve RCE via JDBC string manipulation

    Poništi
  20. proslijedio/la je Tweet
    18. srp 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·