Rezultati pretraživanja
  1. 6. stu 2019.

    Slides and video of my talk "A year of hacking Azure AD" are online! Contains my exploration of the unofficial "1.61-internal" version of the Azure AD graph and the resulting vulnerabilities😃 Slides: Video:

  2. 25. lis 2019.

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

  3. 25. lis 2019.

    Using AzureAD? Here are 's recommendations.

  4. 24. lis 2019.

    DevOps using application scanning in CI/CD pipelines decreases application security risks significantly shown by this large scale study here at . Test those applications every day and don’t let security debt get to your applications! – mjesto: Showbox SoDo

  5. 25. lis 2019.

    Overall comment for my first bluehat? "Pretty Neat". 😁

  6. 24. lis 2019.

    So awesome to meet Alex Stamos today!!! Worth the price of admission.

  7. 25. lis 2019.

    Thank you organizers for turning down the music in between sessions so we can engage with each other!

  8. The playlist of videos is online! For details of what's included, where to see them, and how to become part of a similar lineup for by applying to their CFP, see our blog.

  9. 2. pro 2019.

    The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .

  10. 25. lis 2019.

    Impressive and funny talk by about his exploit development journey of a unauthenticated heap-based buffer overflow vulnerability he found. Best talk I’ve seen in a long time!

  11. 24. lis 2019.

    Hi Seattle! Heading up to , if anyone is around there as well who wants to talk Active Directory or Azure AD security, feel free to reach out! 😃

  12. 8. stu 2019.

    '19 talks are up! In my talk, I demo'd hacking the Scott Pilgrim evil exes. Most proud of ex #3: attacking a microservice by MitMing its request to a 2nd microservice. I worked hard on this & hope you enjoy it! !

  13. 26. lis 2019.

    Forgot to tweet this at the time but had a great talk on mapping vulnerabilities as a data flow graph from a source to a sink (eg a mempy) and using the pattern to identify other vulns in OSS – mjesto: Showbox SoDo

  14. 24. lis 2019.
  15. Glad Meeting you and thanks amazing talk

  16. 24. lis 2019.

    As a frequent user of powershell logs, I’d love to network with anyone from the powershell team at hit me up if you’re here.

  17. 24. lis 2019.
  18. 24. lis 2019.

    Learning about Ransomware at and how ML *may* be used to detect it. Meaty details of the research and PoC.

    Prikaži ovu nit
  19. 25. lis 2019.

    Great to see all the pros at - Here's one of our experts, John-Luke Peck, presenting "autopsies" from recent investigations.

  20. 24. lis 2019.

    First day of . Can't wait to hear from all the great speakers including . Big props to for pulling this together!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.