Yuga

@jerukitumanis

• DevOps Engineer & Security enthusiast •

Vrijeme pridruživanja: studeni 2018.

Tweetovi

Blokirali ste korisnika/cu @jerukitumanis

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jerukitumanis

  1. Prikvačeni tweet
    27. pro 2019.

    #2020 goals : 1. learn node and vue. 2. publish tools for secmon. 3. take a cert from . 4. got first bug with bounty. 5. as public speaker on community event. #2019 i got first bug on big company but no bounty, not lucky for me.

    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati

    what's a container?

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    6. velj

    Alternatives for deprecated 'kubectl run' commands (useful to save a few keystrokes during the CKA/CKAD exam)

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    Today I presented a rough idea of a (brand-new?) data exfiltration technique with regular expression injection and timing attack at OWASP Night (Japan). Enjoy!

    Poništi
  5. proslijedio/la je Tweet
    6. velj

    Hubble is a distributed networking and security observability platform. Hubble can answer questions such as: - What services are communicating with each other? - How frequently? - What does the service dependency graph look like?

    Poništi
  6. proslijedio/la je Tweet
    5. velj

    Jaeles v0.4 - The Swiss Army Knife For Automated Web Application Testing

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  8. proslijedio/la je Tweet
    5. velj

    Introducing "provision" module from - a community-led effort to give you: 🥳 Cheapest possible VM/host 🥳 With a public IP 🥳 Configured with cloud-init / user-data 🥳 Setup with a simple Golang CRUD API With 6 IaaS providers ready to go

    Poništi
  9. proslijedio/la je Tweet
    5. velj

    Pass the Hash - from 12/2019: very well explained and worth to read to really understand this aspect!

    Poništi
  10. proslijedio/la je Tweet
    5. velj

    Did you know that long-lived connections such as WebSockets or DB connections don't scale out of the box in Kubernetes? Learn more in this article from the Leank8s blog:

    Poništi
  11. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  13. proslijedio/la je Tweet

    bypass-firewalls-by-DNS-history - Firewall Bypass Script Based On DNS History Records  

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    NEW BLOG POST ON RECON ON SHODAN PUBLISHED BY ME DO TAKE A READ AND SHARE 🙏

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    My day ends at midnight 03:00am Busy making my tool after coming from the office Finally, it's done Just give a list of url's and this tool will do some enum. -Content-Lenght -Status_code -Dom-XXS -Forms -Title DAY ENDS :) 👇

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. velj

    There's a new repository for payload generators and helper scripts for ffuf. I wrote a HTTP basic authentication payload generator as an example. Contributions are more than welcome, it's show & tell time!

    Poništi
  17. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  18. proslijedio/la je Tweet
    2. velj

    Lesson learned fom analysing the Kubernetes repository with a flamegraph - 4 000 000 lines of (mostly Go) code - Nearly half of these from the vendor folder - 5 vendor packages constitute up to 60% of the vendor folder. - ... More:

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    Copper is a simple tool for validate your configuration files. This is useful with Kubernetes configuration files to enforce best practices, apply policies and compliance requirements. Please note that copper was updated to v2 with no migration path

    Poništi
  20. proslijedio/la je Tweet
    2. velj

    Breaking Down Containers — in this article you will learn in-depth how containers work

    Poništi
  21. proslijedio/la je Tweet
    30. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·