Zander

@captainGeech42

OSUSEC Captain | CS/Security Student | Intel Analyst Intern | Tweets are my own

Oregon State University
Vrijeme pridruživanja: prosinac 2014.

Tweetovi

Blokirali ste korisnika/cu @captainGeech42

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @captainGeech42

  1. Prikvačeni tweet
    9. tra 2018.

    Verifying myself: I am zzzanderw on . TyATMh4Wn82XB0MhyY1LFlLU3Z2a33Vx7h5d /

    Poništi
  2. prije 7 sati
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    “YAML is super picky and annoying!” snivels an entire generation who never had to touch a BIND zone file.

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  5. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    22. sij

    . has launched a new tool with for the detection of compromise in connection with the CVE-2019-19781 vulnerability. The tool is free & accessible on the FireEye & Citrix GitHub repositories. Find out more about the tool:

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    🚀 We're happy to be the first VPN provider to open source apps on all platforms and undergo an independent security audit. Transparency, ethics, and are at the core of the Internet we want to build.

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    If you are unable to install the patch for RDP vulns CVE-2020-0609 and CVE-2020-0610, points out a workaround

    Poništi
  9. proslijedio/la je Tweet
    17. sij

    BREAKING: Microsoft warns about Internet Explorer zero-day * No patch out yet * No CVE, for now * This is the IE zero-day that Qihoo 360 mentioned last week in a now-deleted tweet * Connected to last week's Firefox zero-day

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    In which we discuss an actor deploying a mitigation for the Citrix vuln, but also appearing to have a backdoor.

    Poništi
  11. 17. sij

    FireEye interns are cool! Apply! Source: am FireEye intern

    Poništi
  12. proslijedio/la je Tweet
    17. sij
    Prikaži ovu nit
    Poništi
  13. 17. sij
    Poništi
  14. proslijedio/la je Tweet
    Poništi
  15. proslijedio/la je Tweet
    16. sij

    I’m not sure who needs to hear this right now but the “Authenticated Users” security group in AWS is not the same as in AD. If you set read/write perms for it, it applies to literally any user authenticating to AWS - in or out of your organization.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    16. sij

    By the way, the proper name for CVE-2020-0601 is “I Can’t Believe It’s Not A Real Curve”.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    15. sij

    This is a thread on what we know about Apple’s prototyping and development process of manufactured products. 1/ All info here could be incomplete/wrong/outdated. I may (or may not) update this thread in future if I have enough things to share 😁

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    15. sij

    I wrote a small prototype detector for CVE-2020-0601. See for the package, for the script itself and for more information and current limitations.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. sij

    X.509 validation spoofs explained via interpretive meme

    Poništi
  21. proslijedio/la je Tweet
    14. sij

    Nice of Microsoft to add telemetry for -2020-0601, they are expecting exploitation New Function in crypt32.dll - ChainLogMSRC54294Error CveEventWrite(L"[CVE-2020-0601] cert validation", v8);

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·