Huáscar Tejeda

@htejeda

GCS/M/MU d+ s: a C++++$ UBL++++$ P++++ L++++$ !E--- !W+++$ !N o K--? !w-- !O- M++ !V- PS PE !Y-- PGP+++ !t !5 !X !R- tv b++ DI--- D G+ e++ h+ r+++ y+++

Dominican Republic
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @htejeda

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @htejeda

  1. Prikvačeni tweet
    2. pro 2019.

    Registration for HeapME is now open. In order to use it you'll need my GEF fork while I do the PR.- Sample HeapME URL demonstrating how2heap's glibc malloc's first-fit behavior

    Poništi
  2. proslijedio/la je Tweet
    23. pro 2019.

    Check out the new 2020 syllabus for SEC760 "Advanced Exploit Development for Penetration Testers"...! The course now comes bundled with IDA Pro! ...and co-authorship and contributions from and

    Poništi
  3. proslijedio/la je Tweet

    giving out our new Pen Test shirts for correct trivia answers in at 💀🤘 keep a look out for them at future events!

    Poništi
  4. proslijedio/la je Tweet

    New Research Note: “iBoot heap internals” This is a logical advancement of my previous Research Note: “iBoot address space” in which I explore Apple’s bootchain internals for the purposes of vulnerability research and exploit dev.

    Poništi
  5. proslijedio/la je Tweet

    . is showing us how to take penetration testing engagements to the next level by harnessing the often unexplored advantages of heap exploitation.

    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. proslijedio/la je Tweet
    5. stu 2019.

    Very excited about this update! Jeroen lives and breathes this stuff!

    Poništi
  8. proslijedio/la je Tweet

    In Huáscar Tejeda's () talk you will learn game-changing skills that will help you identify otherwise obscure attack vectors, including understanding high-level Linux dynamic memory allocation concepts. Learn more:

    Poništi
  9. proslijedio/la je Tweet

    Learn game-changing skills that will help you identify otherwise obscure attack vectors from Huáscar Tejeda's () at his talk at . Learn more:

    Poništi
  10. 28. lis 2019.

    What a week!!, SANS Summit Speaker, Facilitator, and holder of the most coveted CTF coin worldwide, SEC760!

    Poništi
  11. proslijedio/la je Tweet

    Introduction to Modern Heap Exploitation for Penetration Testers In this talk, will share game-changing skills that will help you identify otherwise obscure attack vectors. Don't miss it:

    Poništi
  12. proslijedio/la je Tweet
    22. lis 2019.
    Poništi
  13. proslijedio/la je Tweet

    Thank you to all of our speakers for the first ever and our Sunmit co-chair for an awesome two days! 🦄

    Poništi
  14. proslijedio/la je Tweet
    22. lis 2019.

    I had no idea the Dominican Republic had this kind of cyber talent! and are delivering an awesome attack analysis at

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. lis 2019.
    Odgovor korisnicima

    I’m half Dominican and so is

    Poništi
  16. proslijedio/la je Tweet

    Detecting & Mitigating FLAM1 Banking APT: & give a hands-on workshop as they present the detection, analysis of activities, reverse engineering of artifacts, & mitigation of an APT targeting the Caribbean financial sector

    Poništi
  17. 20. lis 2019.

    I'm very excited to speak at the . Looking forward to seeing you there!

    Poništi
  18. proslijedio/la je Tweet

    is EVERYTHING Pen Test has to offer, including hands-on learning experiences, NetWars, CyberCity and presentations from speakers like , , and more. Learn more:

    Poništi
  19. proslijedio/la je Tweet
    2. lis 2019.
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    . and will lead a hands-on threat intelligence workshop to present the detection, analysis of activities, reverse engineering of artifacts, & mitigation of an APT targeting the Caribbean financial sector Agenda:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·