dif.

@dif__

T I S . . .

localhost
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @dif__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dif__

  1. proslijedio/la je Tweet
    28. sij

    Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter!

    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    27. stu 2019.

    Black Friday Deals Thread! The next few days I will be posting any sales I come across on infosec or tech-related stuff that I find interesting. Feel free to contribute! All deals are in no particular order.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. svi 2019.
    Poništi
  5. proslijedio/la je Tweet
    25. tra 2019.

    Tip for n00bs: don't go to cons to learn, you can't learn a subject in a day. Go to cons to learn what you should learn. Being at the con gives you a taste of topics (see which interest you) and which are popular. Then, write down topics, buy books, go home and study.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. ožu 2019.
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. sij 2019.
    Poništi
  8. proslijedio/la je Tweet
    29. sij 2019.
    Poništi
  9. proslijedio/la je Tweet
    27. sij 2019.

    An attacker with just the credentials of a single lowly Exchange mailbox user can gain Domain Admin privileges by using a simple tool. has confirmed on a default Exchange 2013 installation. It's very important to apply mitigations outlined here:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    23. sij 2019.

    It's voting time: help us select the top 10 web hacking techniques of 2018 by placing your vote here:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    18. sij 2019.

    Final call for nominations for the top 10 web hacking techniques of 2018!

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet

    Anonymized Data Set + Anonymized Data Set ________________________ = De-anonymized Data Set 😱 "took a week to match up 17% of the users and 11 weeks to get to a 95% rate of accuracy. (With the added GPS data from smartphones, it took less than a week to hit that number.)"

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    31. pro 2018.

    Prediction for 2019: Golang malware/tradecraft will get much bigger. It easily cross compiles, is easy to write in, and the binaries it produces are just so different than typical C/C++ binaries and it seems AV/EDR doesn't know what to do with it yet.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    We're elated to announce the release of the OWASP IoT Top 10 for 2018 !!! This release focuses on simplicity and usability, with a list that combines the top issues facing manufacturers, enterprises, and consumers.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. pro 2018.

    VirtualBox 6.0 is out, now with support for WHVP (same technology used by Simpleator): — which QEMU also supports. This leaves VMWare as the single remaining vendor that wants you to disable key Windows security technologies in other to run their product.

    Poništi
  17. proslijedio/la je Tweet
    19. pro 2018.

    This write-up from @_bl4de - "Guide to Finding and Exploiting Hidden Web Directories and Files" - is well worth your time this morning.

    Poništi
  18. proslijedio/la je Tweet
    9. pro 2018.

    Hi Twitter, after all the buzz on CVE-2018-1002105 since last week, we are releasing our detailed review of the vulnerability and a simple exploit that works for all default configured Kubernetes clusters.

    Poništi
  19. proslijedio/la je Tweet
    7. pro 2018.

    flAWS 2 is out! Learn to hack serverless (Lambda) and containers (ECS/Fargate)! This time there is also a Defender track to learn log analysis wit jq and Athena and common defender skills. Play it now at

    Poništi
  20. proslijedio/la je Tweet

    WARNING — On most distributions, unprivileged users with UIDs greater than INT_MAX value can execute any command, thanks to a new flaw (CVE-2018-19788) found in , a toolkit responsible for handling authentication & permissions

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·