itszn

@itszn13

Amy | Security researcher at | | 💞

she/her
Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @itszn13

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @itszn13

  1. Prikvačeni tweet
    5. pro 2019.

    Excited to announce that I will also be running my advanced browser exploitation training at Ringzer0 next year!

    Poništi
  2. proslijedio/la je Tweet
    prije 1 sat

    Speaker Highlight: Amy Burnett() will be presenting 'Diverting the Exploit Flow: On Browser Mitigation Effectiveness'

    Poništi
  3. proslijedio/la je Tweet
    prije 5 sati

    Sometimes escaping the sandbox is an overkill, demonstrates how user data can be compromised using code execution within the browser sandbox

    Poništi
  4. 3. velj

    Glad you snagged one before we ran out! We got 60 people to solve our reverse engineering and binary exploition challenge in about a day and a half!

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  6. 29. sij

    This is the year of Linux on the desktop, because Windows 10 support has now ended

    Poništi
  7. 22. sij

    I'm honored to have been asked to speak at Typhoon Con this year! It will be my first time in Korea and I am looking forward to presenting my Forget the Sandbox Escape talk (including some research I couldn't fit into my Bluehat talk :D )

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    🌪Announcement🌪 We're excited to announce that Amy Burnett () of RET2 Systems is one of our upcoming speakers at !

    Poništi
  9. 21. sij

    Made my Bluehat demo even cooler and I'm pretty excited to show it

    Poništi
  10. 20. sij

    Been waiting to announce: I'll be presenting "Forget the Sandbox Escape: Abusing Browsers from Code Execution" at this year's BluehatIL This talk will look at what attacks you can pull off in browsers without needing a sandbox escape I will also be demoing a POC of persistence

    Poništi
  11. proslijedio/la je Tweet
    20. sij

    The wait is finally over! Registration & schedule for 2020 are live. Places are limited so register NOW:

    Poništi
  12. 19. sij

    Maybe should add some detection for browser session data and warn users, like they do for AWS keys

    Prikaži ovu nit
    Poništi
  13. 19. sij

    Luckily passwords files will at least be encrypted but some session data might remain accessible to the world...

    Prikaži ovu nit
    Poništi
  14. 19. sij

    Github Find: People uploading their chrome session data as part of their dotfiles...

    Prikaži ovu nit
    Poništi
  15. 18. sij

    When I was in upstate New York it was like 75% of my diet, and now I can't find it anywhere

    Prikaži ovu nit
    Poništi
  16. 18. sij

    Worst part of moving to San Jose: no where to get good Buffalo Chicken

    Prikaži ovu nit
    Poništi
  17. 18. sij

    Can't wait to fly undefined to undefined in undefined class. Hopefully I can get upgraded to [object Object]

    Poništi
  18. 16. sij

    So long to edge bounties ;P

    Poništi
  19. 14. sij

    Sounds like https is broken on windows, good thing I only use http ☺️

    Poništi
  20. 13. sij

    Be sure to stop by our booth and see if you can CTW (Capture The Water-bottle)

    Poništi
  21. proslijedio/la je Tweet
    13. sij

    We're sponsoring again this year, and we'll be giving away RET2 laser etched bottles to the first 50 hackers who solve our binary exploitation challenge at the conference!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·