jfersec

@jfersec

President . Cyber Security Developer. DevOps and Networking automation. PhD candidate on Application Whitelisting. Veteran, Trusted Consultant.

Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @jfersec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jfersec

  1. proslijedio/la je Tweet

    Logontracer: a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. Also available as a container by the awesome

    Poništi
  2. prije 13 sati

    “Notably he wasn’t collared for the leak of the hacking tools but for child sex abuse images the FBI claimed it had found on a server he ran” What!!

    Prikaži ovu nit
    Poništi
  3. prije 13 sati

    “He antagonized his colleagues. He antagonized management. He was a difficult employee. He really was a difficult employee.” Wow material right here🍿

    Prikaži ovu nit
    Poništi
  4. prije 17 sati
    Poništi
  5. proslijedio/la je Tweet

    Stolen from Rob Simon whose Twitter I can't remember

    Poništi
  6. proslijedio/la je Tweet
    5. velj

    Remember that devices running IOS, IOS-XE, and many other devices are not impacted by . Also an attacker has to be Layer 2 adjacent to the affected device - and a best practice is to block CDP from untrusted networks anyways. see >

    Poništi
  7. proslijedio/la je Tweet
    4. velj
    Odgovor korisnicima

    Here’s one I liked to use. Probably about 20 years old, but not entirely dated.

    Poništi
  8. 4. velj

    “former Verizon executive, Pai is not only hesitant to take on the powerful companies that his office is supposed to oversee, but actively defends and supports the industry from behind the scenes.”

    Poništi
  9. 4. velj

    Looking to hire an AWS certified associate or higher. Not certified, we can help. for qualified individuals. Please RT/share

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  11. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  12. 1. velj

    Call me old fashioned, but curse words on written official gov comms? 🤔 I mean, its already implied if you work in that area, yet almost anyone can find more creative ways to express that resentment while avoiding curse words.

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  14. proslijedio/la je Tweet
    31. sij

    Japanese company NEC confirms 2016 security breach * Took the company seven months to discover the breach * Never made it public * Hackers stole 27,445 files from its defense business division

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Hot off the press - Dallas County (Iowa) attorney agrees to drop charges against Coalfire testers:

    Poništi
  17. proslijedio/la je Tweet
    29. sij

    Coming down to the wire. Well not quite yet, but soon. 2020 CFP closes Feb 9, 2020! Still time to turn those ideas into talks -

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    qalc "145Gbyte / 1.5Mibit/second to day" # How many days will it take to transfer 145GB (base 10 bytes) at 1.5Mibits/sec (base 2)? You can use qalc for that!

    Poništi
  19. 26. sij

    No reports != No problem. Jack victim MAC as yours, jack known victim ip as yours. Raise nic with mac/ip change as you associate back in. Fire up wireshark on that wifi nic. See whats up. Almost 0 chance victim has any idea u c what they c.

    Poništi
  20. 24. sij

    Love game hacking? watch these: Good methodology for RE

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·