Tweetovi

Blokirali ste korisnika/cu @gentilkiwi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gentilkiwi

  1. Will be in Tel Aviv for , for a talk about and DPAPI internals 🥳 Only the 5th (busy kiwi is busy), but with stickers 🥝 >

    Poništi
  2. proslijedio/la je Tweet
    2. velj
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    If you want to grab me and speak (or ) you can find me in Malaga at the / -CSIRT join meeting. Final call for bugs / feedback / comment before the release of 2.8!

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => This is based on the great write-ups by &

    Poništi
  6. , ayé, grâce à nous avons enfin la technologie nécessaire pour reconnaître du JavaScript, et cela même sans l’extension de fichier. Prenez garde les attaquants malicieux 😏

    Poništi
  7. proslijedio/la je Tweet

    Come on, so close to 400 stars... Twitter, do your magic!

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    L’obtention de privilèges élevés sur l’ peut entrainer la prise de contrôle complète d'un Le service Active Directory Security (ADS) de l'ANSSI accompagne la sécurisation des annuaires AD des acteurs critiques (OIV, OSE & administrations)

    Poništi
  9. So, there is Exploit:Win32/CVE-2020-0601.D for Microsoft certificates, and Exploit:Win32/CVE-2020-0601.E for "the others"

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    A breaking trust, an article on CVE-2020-0601 by Yoann DEQUEKER, and Thanks to and for their insights!

    Prikaži ovu nit
    Poništi
  11. [fr] Attention à la mystification.

    Poništi
  12. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  13. Ho yes, unlike , it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. " , 9/10, will compile and link again"

    Poništi
  14. Because I prefer C, little POC to create your own EC alternative keys > With a lots of keys included in the release.

    Poništi
  15. Prikaži ovu nit
    Poništi
  16. Because VBA is not all, with Microsoft PowerShell signed script. Very useful with AllSigned or RemoteSigned execution policy🤪

    Prikaži ovu nit
    Poništi
  17. Prikaži ovu nit
    Poništi
  18. last use case for today Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you)

    Prikaži ovu nit
    Poništi
  19. Poništi
  20. Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·