Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dcocking7
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dcocking7
-
Prikvačeni tweet
https://medium.com/@DanielC7/remote-code-execution-gaining-domain-admin-privileges-due-to-a-typo-dbf8773df767 … A writeup of a an interesting bug I found a while back. Enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Lesser Known Web Attack Lab - train your advances web security skills
#infosec#pentest#bugbounty https://github.com/weev3/LKWA pic.twitter.com/r4r7aozpmO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Java Serialization: A Practical Exploitation Guidehttps://www.rapid7.com/research/report/exploiting-jsos/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Only one week to my presentation at
@InfiltrateCon, “A Bug’s Life: Story of a Solaris 0day”. Come see me talk on how it was to be a hacker 20 years ago and watch me drop the 0day!pic.twitter.com/ezJc1a6dAN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
With the release of my ViewState plugin for http://YSoSerial.Net , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState: https://soroush.secproject.com/blog/2019/04/exploiting-deserialisation-in-asp-net-via-viewstate/ …
#ViewState#Deserialisation#RCE@NCCGroupInfosec@pwntesterPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Here's a writeup of the $5k
#bugbounty I received for finding overly specific location data in#facebookhttps://www.databreachtoday.com/facebook-marketplace-flaw-revealed-sellers-exact-location-a-12402 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
https://link.medium.com/AySwgo8PMU An Introduction to file format fuzzing where we find a previously unknown vulnerability in a real-world piece of software and exploit it to gain code execution. Enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Need privilege escalation? Have access to SMB and NFS shares? Automate looking for credentials! 1) pip3 install -r requirements.txt sudo apt-get install cifs-utils 2) git clone https://github.com/nikallass/sharesearch.git … 3) python3 http://sharesearch.py -p all -w -v -H hosts.lst -C creds.lstpic.twitter.com/7kvsSeNs1D
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
A small write-up on how
@CarbonBlack_Inc Endpoint Protection software allows programs running as administrator to read physical memory using its driver. Carbon Black has said this is not a real security issue. https://d4stiny.github.io/Reading-Physical-Memory-using-Carbon-Black/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
I don’t know how I missed this talk from
@orange_8361 but you definitely should not miss it. It’s critical that everyone understands ASVS 13.1.1 - and why parser differences are exploitable. Spoiler alert: he pops shells.https://youtu.be/28xWcRegncwHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Just released Windows Exploit Suggester - Next Generation! Based on the output of Windows' systeminfo.exe utility, this tool provides you with the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities. Get it at: https://github.com/bitsadmin/wesng pic.twitter.com/TmNO0QW07E
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Fuzzing Adobe Reader for exploitable vulns using AFLhttps://kciredor.com/fuzzing-adobe-reader-for-exploitable-vulns-fun-not-profit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
#bugbountytips Show me your subdomains@Tesla Collect subdomains by regexp in#burpsitepic.twitter.com/SwOEMCfIiP
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Access from
@hackthebox_eu just retired. My favorite part was learning how to extract dpapi creds on Windows using Mimikatz, even if you didn't need to do that to solve. Here's how I did it:https://0xdf.gitlab.io/2019/03/02/htb-access.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
#bugbountytips@Burp_Suite I don'remember who share detect possible hidden ssrf | openredirect by burp suite and he write that for detecting search "=http | =https" I build regexp for burp =http(s)?:\/\/\w+(.+)?\.(w+)pic.twitter.com/2ECiGg3f3m
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Forgot to add some hashtags..
#websphere#exploit#cyber#cybersecurity#Hackinghttps://twitter.com/x41x41x41/status/1101463337374834693 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Just a reminder of what you are really buying in either bug bounty or pen test here. They boast of over 1200 programs. But only have about 1000 hackers who've cleared more than $5k in bug bounties & only about 100 who have made more than $100k (pen tester salary range) last year.pic.twitter.com/V99prWyjJA
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
EXCLUSIVE!! h1 admits that its business model sucks, blames it on pen test companies, vows to suck less. "“Most [penetration testing] companies suck,” Mickos said during a recent interview in New York City. “Our plan is to take the market share from pen test companies.”"



https://twitter.com/gregotto/status/1101493894469033985 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Source didn't fit into tweet https://insert-script.blogspot.com/2019/02/libreoffice-cve-2018-16858-remote-code.html … 4.1.6 is still the latest version on the OpenOffice webpage.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Cocking proslijedio/la je Tweet
Host header poisoning in IBM Websphere eCommerce (CVE-2017–1398). Inject password reset emails with malicious links.https://medium.com/@x41x41x41/host-header-poisoning-in-ibm-websphere-3d459a990f00 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.