sushi2k

@bsd_daemon

Project Leader of the OWASP Mobile Security Testing Guide and MASVS

Singapore
Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @bsd_daemon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bsd_daemon

  1. Prikvačeni tweet
    11. sij
    Poništi
  2. 31. sij

    Thanks for having me! Was a great experience and looking forward for next year :-) Here is the direct link to my talk from iOS Conf:

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    The videos of 2020 is available now. . A big thanks to and for recording these videos every year for us. 🎉🎥❤️

    Poništi
  4. 17. sij

    Just finished my talk at . Had a great time and there were many good questions! Thanks for having me. If you are interested in the slide deck and the demo videos I made you can download all of them here:

    Poništi
  5. 14. sij

    ⁩ is happening this Friday! Ping me if you are there, happy to chat

    Poništi
  6. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  7. 17. pro 2019.

    It’s an honor to be selected and having the opportunity to speak about the ! Looking forward to it and be prepared for some nice mobile hacking demos🤓

    Poništi
  8. 6. pro 2019.

    This how security should be done. Really nice read!

    Poništi
  9. 1. pro 2019.

    Hey . Can you please DM me? Thanks

    Poništi
  10. 25. stu 2019.
    Poništi
  11. 20. stu 2019.

    After 1.2 billion medical images were leaked yesterday ( ) another massive leak will come tomorrow...

    Poništi
  12. proslijedio/la je Tweet
    19. stu 2019.

    Our own Jeroen Beckers just gave an exciting talk about using Mobile Malware tactics in Red Teams at the SANS Pentest Hackfest in DC! Slides & recording will be available online later at ! 🐀

    Poništi
  13. 18. stu 2019.

    Nice solution with Angr for our "UnCrackable App for iOS Level 1". If you want to Reverse Engineer also other iOS/Android apps, have a look at our Crackmes:

    Poništi
  14. 14. stu 2019.

    Superb library created by to secure iOS apps . I made a quick PoC and it works as a charm . With this library you can easily detect: - Jailbreak - being debugged - Reverse Engineering Tools (e.g. Frida) - Run in an emulator

    Poništi
  15. 13. stu 2019.

    Interesting read:"This means, that an Android phone that has NFC and Android Beam enabled, then touching a malicious phone or a malicious NFC payment terminal to the device may allow malware to be installed by bypassing the “install unknown apps” prompt."

    Poništi
  16. proslijedio/la je Tweet
    1. lis 2019.

    Thank you for creating the MSTG & MASVS! Together we can make safe again

    Poništi
  17. proslijedio/la je Tweet

    We are looking for international lawyers that can help us out with a requirement for the MASVS in terms of which laws to comply with. Who can help us with that ? (for free ;-)?) (Not a lawyer? Please RT ^^)

    Poništi
  18. proslijedio/la je Tweet

    Is throwing it back in justified? RT for YES Like for NO

    Poništi
  19. 23. kol 2019.

    Looking forward for AppSecDay in Melbourne! If you want to see some nice mobile hacks and how to defend yourself come to my talk. See you there 📱

    Poništi
  20. proslijedio/la je Tweet
    22. kol 2019.

    is a core project leader for and other projects. At he is going to show how to attack, test, and defend Mobile applications.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·