Tweetovi

Blokirali ste korisnika/cu @isec_pl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @isec_pl

  1. proslijedio/la je Tweet
    30. sij

    DMA attacks are often misunderstood as requiring physical access to a device. However, in many cases they can be done remotely, like in this example of exploiting firmware on Nerwork Cards

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    Awesome to hear that my 's research ("All is XSS that comes to the .NET") landed on the nomination list for 's top 10 web hacking techniques of 2019.

    Poništi
  3. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  5. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  6. 17. pro 2019.

    And the winner of one of CTF's during is... of ISEC. also won something :-)

    Poništi
  7. 17. pro 2019.
    Poništi
  8. 14. pro 2019.

    Już za kwadrans Piotr Szeptyński opowie o naszym napadzie na bank! Banking&Finance, sala P2L5 (Warszawa) Zapraszamy!

    Poništi
  9. 14. pro 2019.

    Hej! Jeśli chcesz wygrać KON-BOOTa, zapraszamy na partyjkę szachów na stoisko ISEC na !

    Poništi
  10. 14. pro 2019.

    Za 15 minut będzie opowiadał o Web Cache Poisoning na . Sekcja "Red&blue teaming", sala P2R5 (Rzym). Zapraszamy!

    Poništi
  11. 13. pro 2019.

    KON-BOOT jest wygodnym narzędziem pomagającym ominąć autoryzację Win/Mac. Możesz takiego dostać, jeśli w sobotę ograsz nas w szachy - albo choć będziesz blisko zwycięstwa. Zapraszamy na stoisko ISEC na (2 piętro, blisko K12).

    Poništi
  12. proslijedio/la je Tweet
    12. pro 2019.

    Prezentacja na - ostatnie szlify. Już w sobotę o cache poisoning, a Piotrek Sz. o napadach na (m)bank.

    Poništi
  13. 11. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  15. 4. pro 2019.

    You DO verify all libraries you use in your code, don't you? Fake versions of libraries steal .gpg/ and .ssh/ from your computer.

    Poništi
  16. 28. stu 2019.

    What The H@ck is a major Polish event for security professionals. We will be there to talk about and of . See you in December!

    Poništi
  17. 22. stu 2019.

    Second issue of Paged Out is out. One page per article, one article per page, lots of and content. // by & team

    Poništi
  18. 21. stu 2019.

    Malicious code in image file - why not? Injection points in popular image formats by

    Poništi
  19. 19. stu 2019.

    Today will talk about pentester's life during the conference in Łódź. Expect English version of his slides... soon. :-)

    Poništi
  20. 18. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·