evildaemond

@evildaemond

Electronics and Hardware guy, most likely will break stuff. Focuses on Cyber Security and Security in general.

Perth, Western Australia
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @evildaemond

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @evildaemond

  1. Prikvačeni tweet
    30. pro 2018.

    With 2018 coming to an end, I figured it would be a good idea to write up some of the best content I looked at in 2018, if you have the time, give it a quick look, you may have missed some cool stuff from this year.

    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. proslijedio/la je Tweet

    Literally the first and last time anyone has ever wanted to talk to Mitnick at a hacking con. 🙄😏

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    “I’ve CC’d in my boss” - professional - corporate - mildly threatening “You wanna say that in front of Greg?” - confident - threat level 9000 - who is Greg and what is he capable of

    Poništi
  5. 28. sij

    Fancy new book to read through, so far this is the most sensible explanation of a red team. Cant wait to sink into this one.

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Do you remember the private key for the CA signed certs stored in Netgear routers? Just wanna say: I LOVE THE WORKAROUND!

    Poništi
  7. proslijedio/la je Tweet
    25. sij

    I'm going to write an article on how to enter the industry. What's a piece of advice you wish you got when you were first starting? RTs appreciated Will try get this out by Monday 😊

    Prikaži ovu nit
    Poništi
  8. 24. sij

    I just published an article on USB HID Attacks.

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Shoutout to for writing an Anti-RE book. I've been reading it and it's a great way for people to understand some of the techniques used by all sorts of software. It's also written in readable language that's easy to follow. A+

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    21. sij
    Poništi
  12. proslijedio/la je Tweet
    21. sij
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. sij

    Dear , Putting the private key for a CA blessed certificate in firmware is a bad idea. and I found a couple a couple terrible things.

    Poništi
  14. proslijedio/la je Tweet
    18. sij

    The UK's NCSC (defensive branch of GCHQ) have put their draft "Secure Communication Principles" on Github for public review! Alas, they seem to be forbidden from mentioning 'end to end encryption' leading to some tortured phrasing...

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    16. sij
    Poništi
  16. proslijedio/la je Tweet
    15. sij

    Hainan Xiandun Technology Company is APT40. They recruited Hainan based Cambodian linguists three months before APT40 conducted their Cambodia campaign.

    Poništi
  17. 15. sij

    Always good to see somebody put their money to a good use

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    Offering a $100USD bounty to whoever can build out ... payable once merged by (DM to receive). This has wide reaching benefits to newcomers and a great one to have your name against!

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    I'm planning another giveaway. I'm thinking the next one will depend on the recipient making a contribution to the community (github pull request, blog, something else) to claim a subscription voucher.. thoughts? Is it better to just free for all?

    Poništi
  20. proslijedio/la je Tweet
    10. sij

    is already off to a good start in And these signs straight up rule.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    7. sij

    Ah yes, Travelex and the curse of unpatched critical Pulse VPN vulns leading to a major incident. People ask "why is patching so hard for orgs?" I work for a large UK hospitality org. We run Pulse Secure VPN. It took ages to sort patching out & I'll explain why, so thread..

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·