GlobalSecure Academy

@globalsecure_

Academia de CiberSeguridad - Servicios Profesionales de CiberSeguridad, Ethical Hacking y Computación Forense. Somos los creadores de la certificacion G|PPT

Santiago de Chile
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @globalsecure_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @globalsecure_

  1. proslijedio/la je Tweet
    27. ruj 2019.

    Acercate al stand de para conocer más sobre ellos y participar de su desafío. Podés ganarte remeras 🤩 . Come meet the team and their work, they have challenges and you can win prizes 🤩

    Poništi
  2. proslijedio/la je Tweet
    27. ruj 2019.
    Poništi
  3. Vengan por su polera (remera) a nuestro stand! Deben hackear una de los 3 servidores reales que hay y listo! En 15 minutos para darle adrenalina! 💪💪

    Poništi
  4. Excelente convocatoria a nuestro Stand para conocer de nuestra academia y de nuestro desafío para ganarse una Polera (remera) en la Felices de estar apoyando a la Eko y esperamos que sean muchos años más! 💪💪

    Poništi
  5. proslijedio/la je Tweet
    26. ruj 2019.

    Terminó , ¿conseguiste tu próximo desafío? 🙏 . is over, did you find your next challenge?🙏 Thanks by Help Systems

    Poništi
  6. proslijedio/la je Tweet
    13. ruj 2019.

    Gracias por apoyar a la eko como Gold Sponsor 🌟Para saber más sobre ellos visitá . Thank you for supporting ekoparty as a Gold Sponsor 🌟 To learn more about them, visit

    Poništi
  7. proslijedio/la je Tweet
    12. srp 2019.

    Just tried this out and it works! Next time you get a vendor email, reply with this: (code here: ) with a subject line of "Mail Delivery Subsystem - Address Not Found" (make sure to clear out the "RE:" and other subject line :)

    Poništi
  8. proslijedio/la je Tweet
    20. svi 2019.

    We analyzed the vulnerability CVE-2019-0708 and can confirm that it is exploitable. We have therefore developed detection strategies for attempts to exploit it and would now like to share those with trusted industry parties. Please contact: nomoreworm@kaspersky.com

    Poništi
  9. proslijedio/la je Tweet
    21. svi 2019.

    My new favorite way to launch powershell.exe :: I think you'll like this one, 🥰

    Poništi
  10. proslijedio/la je Tweet
    21. svi 2019.

    issued several firmware updates for a high-severity vulnerability in its Secure Boot that impacts millions of its hardware devices.

    Poništi
  11. proslijedio/la je Tweet
    19. svi 2019.

    CVE-2019–6977 : WordPress 5.0 RCE &meta_input[_wp_attached_file]=2019/02/2-4.jpg#/../../../../themes/twentynineteen/32.jpg

    Poništi
  12. proslijedio/la je Tweet
    7. tra 2019.
    Odgovor korisniku/ci

    Vaya directo a la fiscalia para ver si pueden solucionar este problema y haga dos denuncias una contra el dueño del maserati y otra contra por no tomar el procedimiento Y se oficie a la autopista para las imágenes de las cámaras que sirven de prueba

    Poništi
  13. proslijedio/la je Tweet
    7. tra 2019.

    Se busca Maserati azul abollado adelante al costado derecho. Chocó el jueves a una madre con su hija recién nacida en la Costanera Norte y huyó. Ayuda con RT

    Poništi
  14. proslijedio/la je Tweet
    7. tra 2019.

    I just finished Web Security Academy labs It's great learning source with free trainings + labs to test your skills: -SQL injection -XSS -OS command injection -DIR traversal Hope, we can expect more topics to come

    Poništi
  15. proslijedio/la je Tweet
    9. velj 2019.

    The cellebrite UFED touch units were vulnerable to password bypass exploits in Phoenix BIOS, haven't used this attack for years! Just enter the code at the system disabled message in and you get a usable bypass code.

    Poništi
  16. proslijedio/la je Tweet
    9. velj 2019.

    Privilege escalation on UFED touch, auxiliary is Admin and using a shared password. Shows how Operator can escalate privilege to Administrator and interfere with the unit.

    Poništi
  17. proslijedio/la je Tweet
    10. sij 2019.

    Metasploit Framework 5.0 released

    Poništi
  18. proslijedio/la je Tweet
    21. ruj 2018.

    HackBar (Burpsuite Plugin). Source code:- Release :- BurpSuite jar file. Have fun 😉

    Poništi
  19. proslijedio/la je Tweet
    7. ruj 2018.

    Ten Process Injection Techniques: A Technical Survey Of Common And Trending Process Injection Techniques -

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·