Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @jnazario
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jnazario
-
Prikvačeni tweet
i'm open sourcing a tool i wrote a couple of years ago, it facilitates using nmap and NSE scripts. https://github.com/paralax/ObsidianSailboat … aka
#osail useful for#appsec and#Pentesting uses. has become a go-to tool for me. think an MSF-like wrapper for nmap+NSE. /cc@simps0nHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
serverless blockchain AI proslijedio/la je Tweet
The explosion of IP-connected devices has created a wealth of interesting searches on a platform like Censys... take a look at our new blog on finding exposed IP-connected video cameras: https://censys.io/blog/watching-the-watchers-watching-a-look-at-ip-connected-video-cameras-in-the-wild … by our very own
@jnazarioHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
toying around a bit again .. this time i took a tweetdeck search i have for "poc exploit code" and did ngram frequencies - it does what i hoped it would, condenses down dozens of tweets into a single bite about new exploit code.pic.twitter.com/8iquARJ0hO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
serverless blockchain AI proslijedio/la je Tweet
The NSA's 50s-70s security motivational posters are
.
http://www.governmentattic.org/28docs/NSAsecurityPosters_1950s-60s.pdf …pic.twitter.com/6LgCZHk1mc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
congrats to
@sunubunu and the frest of the@scytale_io crew! a lot of hard work rewarded.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
serverless blockchain AI proslijedio/la je Tweet
RETWEET THIS TONIGHT TO HELP
#MAKESPACEFORWOMEN
For every RT, Olay is donating $1, up to $500K, to help @GirlsWhoCode. Because when we#MakeSpaceForWomen
, we make space for everyonepic.twitter.com/fNLFgrLGo6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
serverless blockchain AI proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
serverless blockchain AI proslijedio/la je Tweet
Hello! I am looking for an entry level
#infosec /#CyberSecurity job in Chicago or NWI. I have 9+ years of IT experience. I am working on Security+ at the moment. I also enjoy learning through podcasts, videos, books, and hands on projects#informationsecurity#infosecjobsPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is super cool and I’m glad to see it released. This builds on work josh and colleagues have been doing for many years and he posited a long time ago. Plus I learned something new about Yara today. Def gonna try this out.https://twitter.com/joshua_saxe/status/1222502245792501760 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
i don't know if this is the herder's end goal, but given the effects it seems like a deliberate sensor and reporter unmasking strategy. end/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
i don't know which botnet it is, but if you're the herder and know your botnet IPs and who is scanning for those generated paths, you can then cast queries for them in various indicator sharing sites and figure out their sensors. 7/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
again, this doesn't appear to be specific against my honeypots - i was able to figure it out because i queried the IPs that triggered my role in other sensor networks and saw different AdminHEX paths and figured it out from there. 6/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
but in this case the appearance of their method in indicator feeds - in this case IP reputation feeds - would dump the sensor network's IP addresses. so anyone watching such feeds can figure out reporting sensors and poison them, avoid them, etc. 5/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
the attack works because of sensors - like mine - which automatically publish their findings often include evdidence about how they made their judgement, in this case the path queried by the bot. this is there to help an operator decide if the report is trustworthy. 4/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
in Python for that hex string: '.'.join(str(netaddr.IPAddress(0xa0e6cafd)).split('.')[::-1]) ... which yields 253.202.230.160 (a deliberately random hex string and IP). now i know why queries for that path in Google yielded nothing. 3/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
the paths look like /Admina0e6cafd/index.php, where "a0e6cafd" is a hex string - but it's not random. it turns out it's the zero-padded hex encoded IP address of the sensor reversed. here's how the encoding works. 2/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
over the past week or more, my HTTP honeypot has been seeing a small but growing number of hosts querying for a very distinctive path. i figured it out - it's a sensor discovery attack, globally scoped (not unique to me or speicific sensor nets). 1/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
serverless blockchain AI proslijedio/la je Tweet
What are the temporal dynamics of malware outbreaks? Here's a simple model: an outbreak starts with slow growth, followed by takeoff, followed by a dwindling/taper. Detail image shows Zbot/Zeus, image grid shows other malware families. Work done w/ Giacomo Bergamo.pic.twitter.com/eaCCfCfMBE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I never finished the model, I’m sad about that, but after a decade I give up. I share it with the hopes that someone will pick it up and explore it, but it’s made for a fun way of thinking about the problem and how it periodically pops back up, this time as
#NotRobin. end/Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
and even more I states (for various attackers), and so an attacker in this game would work to hold a machine in a specific I state - their I state representing their unique infection/backdoor/etc. 12/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
S-I-R is the standard in basic epidemiology and was common in malware outbreak modeling. Each population member is either (S)usceptible, (I)nfected, or (R)ecovered. In this modified model, there were multiple S states (for each vuln) 11/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.