dreadl0ck

@dreadcode

Tortures computers for fun and profit. Interested in network security monitoring, machine learning, Golang and Rust. Shellscript ninja. Will debug for food.

Amsterdam, The Netherlands
Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @dreadcode

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dreadcode

  1. Prikvačeni tweet
    21. pro 2018.

    Published my Bachelor Thesis: "Implementation and evaluation of secure and scalable anomaly-based network intrusion detection" along with my network traffic analysis framework:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  3. proslijedio/la je Tweet
    22. pro 2019.

    Yikes! A top iOS app in 's App Store, was a government spy tool!? 🍎📲🕵️‍♂️😱 "...used by the govt. of the United Arab Emirates to try to track every conversation, movement ...of those who install it on their phones" - Our technical analysis:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    We are so excited to announce TamaGo: bare metal Go for ARM SoCs. This project allows, with minimal adaptation to upstream Go, execution of 100% Go applications on the USB armory and hopefully more platforms in the future. Check it out!

    Prikaži ovu nit
    Poništi
  5. 20. lis 2019.

    Cc ;-)

    Prikaži ovu nit
    Poništi
  6. 19. lis 2019.
    Prikaži ovu nit
    Poništi
  7. 19. lis 2019.

    Interested in evaluating your corporate network defenses against a parasitic reverse tracerouting attack? We are currently running a case study for our research project OS3 institute. Paper and source code release are scheduled in two weeks.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    17. lis 2019.

    The Linux Forensics workshop (labs, slides, forensic images "E01")+talk done at 2019, is now available here:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    18. lis 2019.
    Poništi
  10. proslijedio/la je Tweet
    16. lis 2019.

    [1/4] Ok this is really funny, check this out. I was in the process of booking a flight via . Trying to make me book ASAP, they claimed: "38 people are looking at this flight". Whoa, 38 is a lot, I have to hurry up. But first I have to check how they came up with 38 >>

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    10. ruj 2019.

    Introducing : the first PRIME+PROBE cache attack over the network using technology. Here is NetCAT leaking keystrokes from a victim SSH client in real-time: Dennis

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. lis 2019.

    The next step after encrypted DNS: anonymized DNS. I’m thrilled to announce the first generally available implementations of the Anonymized DNScrypt protocol. - Say no to centralization. We need DNS relays all over the world.

    Poništi
  13. proslijedio/la je Tweet

    This is what radiation LOOKS like. Uranium emitting alpha particles through cooled vapor

    Poništi
  14. proslijedio/la je Tweet

    Is it time for the Robotic Olympics? Credit: Boston Dynamics

    Poništi
  15. proslijedio/la je Tweet
    19. ruj 2019.
    Poništi
  16. proslijedio/la je Tweet
    11. ruj 2019.

    The Windows Defender telemetry and sample collection network is called - I kid you not - "SpyNet". Here's a good resource with all the URLs used for sending the telemetry and other data:

    Poništi
  17. 9. kol 2019.

    Cloud Native open sourced the Kubernetes Security Audit:

    Poništi
  18. proslijedio/la je Tweet
    2. srp 2019.

    Rustls vs OpenSSL: : * 15% quicker to send data * 5% quicker to receive data * 20-40% quicker to full handshake (client) * 10% quicker to full handshake (server) * 30-70% quicker to resume (client) * 10-20% quicker to resume (server) * Uses <1/2 as much RAM

    Poništi
  19. proslijedio/la je Tweet
    14. svi 2019.

    Today we present (or ), a new class of speculative execution vulnerability on CPUs to leak in-flight data across any security boundary

    Poništi
  20. 14. svi 2019.

    Oh and here is a timelapse video I made on my way to the conference on the second day. Join me on a sunny ride through vondelpark and the city center :)

    Poništi
  21. 14. svi 2019.

    Speaking at HITB was awesome, I got a lot of positive feedback and a couple of new ideas. Slides are available here: Talk is on YT: New release is available on github: PS: Netcap is watching you :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·