gteissier

@guteissier

& | Telecom & Information Security Professional | for tools and code

Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @guteissier

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @guteissier

  1. proslijedio/la je Tweet
    30. sij

    RHSA-2020:0310: Important: Red Hat Security Advisory: rh-java-common-xmlrpc security update

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Mavenir Looks to Cash In on Anti-Huawei Frenzy

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Trend Micro antivirus zero-day used in Mitsubishi Electric hack | ZDNet. Conclusion: stop Deploying on systems.

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    GitHub - orangecertcc/xmlrpc-common-deserialization: CVE-2019-17570 details and proof of concept -

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    -2020-2551 Weblogic RCE via iiop protocol, funny bug:D

    Poništi
  6. proslijedio/la je Tweet
    15. sij

    Want to play with LoRa using SDR? Or have few guidelines for you security assessment? Checkout my new post here:

    Poništi
  7. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    Having fun in the evening. My first basic operation for CyberChef is working

    Poništi
  9. 31. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    16. pro 2019.

    Excited to return 4y later to to present protocol vulnerabilities & exploits. I’ll be showing+analyzing real UL+DL traffic captures off the air from real 5G Rel15-compliant NSA and SA devices and showing pre-auth message-based exploits are still possible

    Poništi
  11. proslijedio/la je Tweet

    Don't miss the latest Humble Bundle from No Starch Press. A portion of proceeds benefits the No Starch Press Foundation. Please RT!

    Poništi
  12. 1. pro 2019.

    Good to see one of my tools in action 🙃srtp-decrypt turns ciphered real-time media packets into clear packets

    Poništi
  13. proslijedio/la je Tweet
    29. stu 2019.

    Profitez de réductions sur les nouveaux abonnements Premium et accédez dès aujourd'hui aux nouvelles séries "Programmation/Ethereum" et "App-Système/Windows PE" : - 50% ce - 20% ce WE Faites parti des 100 premiers à RT pour obtenir votre code ! Quantité limitée !

    Poništi
  14. proslijedio/la je Tweet
    29. stu 2019.

    RCS communication attack by Karsten Nohl SRLabs waiting for details....

    Poništi
  15. proslijedio/la je Tweet
    26. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.

    Poništi
  17. proslijedio/la je Tweet
    13. stu 2019.

    Super-interesting research: SICO. Surgical Interception Attacks by Manipulating BGP Communities cc:

    Poništi
  18. proslijedio/la je Tweet

    Microsoft has patched the automatic macro execution bug on🍎(CVE-2019-1457) 🙌🙌 Go update! Was a fun bug to weaponize into a comprehensive exploit that could remotely & persistently infect macOS Catalina by users simply opening a document 📝👾 Full details @ v3.0? 🤔

    Poništi
  19. proslijedio/la je Tweet

    The schedule for Tokyo 2019 is now live. We have 10 attempts today and 7 tomorrow. We'll be updating the blog throughout the contest with live results. Check out all the details at

    Poništi
  20. proslijedio/la je Tweet
    4. stu 2019.

    Co-authored my first paper, with the amazing folks at ! Fuzzing one of the most unfuzzable environments, via full-system emulation, reveals 48 vulnerable "Trusted Applications" across four TEEs that run on ~2 billion devices.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·