-
My
co-pilot this Sunday am while I work on #SEC660 Yes, Bunni has her own chair next to me cause she likes to b held & it’s hard to type w no hands.#compromise#shesmyboss#tortiepic.twitter.com/Iw5pH1R585
-
@deadlisting giving out our new Pen Test shirts for correct trivia answers in#SEC660 at#CDI
keep a look out for them at future events!pic.twitter.com/CvV6RG88ub
-
Congratulations to the
#SEC660 winners at#SANSCopenhagen. Thank you everyone for a great week. If you’ve never been to Copenhagen I highly recommend it! @SANSPenTestpic.twitter.com/SOsxTewFwm
-
Day 1 of SANS Copenhagen
#SEC660. This is an absolutely beautiful city. If you haven’t been here I highly recommend coming. Here’s my hotel view for the week. pic.twitter.com/pfQEvAqlt1
-
In case you're bored... Here's a "hackme" challenge I gave out to my students today in London. It's an x64 ELF stack overflow with a couple of silly custom exploit mitigations for which you must compensate. Intended OS is Kali Linux. http://deadlisting.com/files/London_Challenge …
#SEC660Prikaži ovu nit -
#SANSAmsterdam#SEC660 is a wrap! Excellent scores! Congrats to the winning team and our fantastic facilitator@tazwake!pic.twitter.com/svg6liHrYs
-
Finally found this ptmalloc flow chart again: https://raw.githubusercontent.com/cloudburst/libheap/master/heap.png … It's great for getting started (or dusting off those skills if it's been a while) with dynamic memory in your exploit dev adventures
#sec660#sec760#sanscdi -
Thanks to
@0xabe_io@SANSInstitute@SANSPenTest for this excellent#SEC660 course! Our 1team didn't get the coin but it was an awsome CTF!#SANSParis#InfoSec#pentestpic.twitter.com/YQu6H0SQnA
-
Creating San index for SANS
#SEC660 Advanced Pen Testing exam. My fingers hurt. -
#SEC660 CTF is a wrap! Great scores all around! Congratulations to the winning team!#SANSNetworkSecuritypic.twitter.com/r36TOGxBKe
-
Wrapping up a great week of
@SANSInstitute#SEC660 with@13M4C. Had@highmeh as a facilitator and I'm super happy to hear he's in instructor development program.pic.twitter.com/ZjZVJx589U
-
Great week at
@SANSInstitute#SANSNetworkSecurity#SEC660! Caught up with old friends and made some new ones!#FF@maridegrazia@secitup@ryko212@highmeh@CCrowMontance@tarah@TimMedin@daoist@MalwareJake@MotoSploit -
SANS | Pen Test HackFest 2017 - Talks Introduction to Reverse Engineering for Penetration Testers by
@Steph3nSims YouTube: https://youtu.be/fnYp2DN_XZc Attend#SEC660 | Online | vLive | Two Nights/Week x 12 Weeks Oct 23rd - Nov 29th > https://www.sans.org/vlive/details/sec660-23oct2018-james-shewmaker …pic.twitter.com/JOvmENQWDB
-
Paid homage to some old school hackers & codebreakers
@bletchleypark. Absolutely amazing what they accomplished back then! Gave me a whole new appreciation for exploiting cryptographic weaknesses taught by@Steph3nSims &@jimshew in#SEC660.#GXPN FTW!@SANSInstitute@CertifyGIACpic.twitter.com/agchelOive
-
Heading to DC for
#SANSFIRE@SANSInstitute. Looking forward to some advanced hacking and some exploit dev#SEC660. Let do this!@SANSPenTest#MyKneesMayHaveBufferOverflowedThisTinySeat -
Just finished an awesome week of
#SEC660 at#SANSLondon, the perfect level of challenge, stretch and frustration for learning. I need a beer. Cheers@MalwareJake -
Nothing beats an unexpected
#SEC660 CTF on a cold Saturday morning ;)@jameslyne@SANSPenTest@SANSEMEApic.twitter.com/OCfgjeSlA3
-
I'm so excited to be taking
@SANSInstitute#SEC660 "Advanced PenTesting" from@Steph3nSims at SANS Cyber Defense Institute!#SANSCDIpic.twitter.com/FAWs3yalKS
-
#SANSParis November : Jour 2 et bien parti avec Alexandre@0xabe.io#SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking en français@SANSEMEApic.twitter.com/YQ4sIj4TJt
-
Hackers want to hold your data for ransom: Here’s how to stop them
@todayshow@jameslyne@tomcostellonbc http://www.today.com/video/hackers-want-to-hold-your-data-for-ransom-here-s-how-to-stop-them-899367491901 …#SEC660 pic.twitter.com/8Uef4P7jeB
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.