Üzeyir  

@destanuzeyirr

Security Researcher , Red Team , OSCP , Synack Red Team

İstanbul, Türkiye
Vrijeme pridruživanja: srpanj 2013.

Tweetovi

Blokirali ste korisnika/cu @destanuzeyirr

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @destanuzeyirr

  1. proslijedio/la je Tweet
    5. velj

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Question : what’s the worst information security advice you have ever seen or heard?

    Poništi
  4. Leveled up to 0x01! aracılığıyla

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    network protocols

    Poništi
  6. proslijedio/la je Tweet
    9. lis 2019.

    Rooting a Pixel 2 with Magisk from an untrusted app using CVE-2019-2215, no OEM unlock needed

    Prikaži ovu nit
    Poništi
  7. Yalnız bu THAAD(Terminal High Altitude Air Defence)

    Poništi
  8. Poništi
  9. proslijedio/la je Tweet
    19. sij

    Good article on pentesting use cases for Docker. Personally haven't had a need or desire to faff around with containers and still don't though tbh!

    Poništi
  10. proslijedio/la je Tweet
    16. sij

    Updated PoC to include the root trusted CA "Microsoft ECC Product Root Certificate Authority 2018" Also included a signed and unsigned 7z.exe for you to test out. Please only use for research and education.

    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    14. sij

    Steps for making a self-signed ECDSA certificate using a fake Microsoft Certificate Authority. This isn't the CVE-2020-0601 bug (somehow you sign using ECDSA and make a valid chain with other CA), but useful commands if you are experimenting with this for Authenticode bypassing.

    Poništi
  15. The first bug of both 2020 and . 2020 will be my year. Thanks

    Poništi
  16. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Poništi
  18. Poništi
  19. 7. sij

    Askeri lisede bölük komutanımız, kamp dönüşü vapurdayken isimliğini çıkarmıştı ve bize de çıkarttırmıştı. 13 sene sonra haklılığını görmek gurur verici.

    Tweet je nedostupan.
    Poništi
  20. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·