Emanuel Duss

@mindfuckup

IT Security Analyst. Linux, CLI, Shell, Scripting, Network, Security, Crypto, Pentesting.

Switzerland
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @mindfuckup

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mindfuckup

  1. Prikvačeni tweet
    9. sij 2015.

    Verifying myself: I am emanuelduss on Keybase.io. yR6tYkgHNHrxNX5YC8LpxCuYxLJ1vf9v35eW /

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Linus Torvalds Pulls WireGuard VPN into Linux 5.6 Kernel Source Tree

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    "Ständig passieren in diesem Fall Dinge, die eigentlich gar nicht möglich sind, ausser man ändert den Betrachtungs­winkel."

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    23. sij

    Remember that fake ? I tried to figure out its purpose. I describe it in my first blog post since nearly three years: Kudos to for his blog post () about insecure backends.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    23. sij

    We are just running an in-depth , with lots a practise, demos and hands-on in . Are you a and ready to cope with latest ?

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    how containers work: capabilities

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    14. sij

    Do you know the most common security in internal networks? And do you know how to protect and defend your IT infrastructure? Gain in-depth knowledge and expand your competence in .

    Prikaži ovu nit
    Poništi
  8. 27. pro 2019.

    Yayy, I did it in 39 seconds, best time so far 😀🎉 Can you beat this? Try it!

    Poništi
  9. proslijedio/la je Tweet

    You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    Do you have a ? Then I have some pre-xmas, pre- gifts for you! Here's a thread:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    8. pro 2019.

    Blueteam members need to find and patch or monitor attack paths environments. Sylvain Heiniger explains how to easily spot issues using . Thanks to , , and for the awesome tool.

    Poništi
  13. proslijedio/la je Tweet
    1. pro 2019.

    Ich habe wieder einmal eine Leserfrage beantwortet. Es geht um ! 🔐

    Poništi
  14. proslijedio/la je Tweet

    Next in Finally merged permission/"control path"/"bloodhound light" analysis into the healthcheck report. Beta testers needed & feedback welcomed (support@pingcastle.com) No more excuse to get your domain compromised in 1 minute.

    Poništi
  15. proslijedio/la je Tweet
    30. stu 2019.

    HACKvent is going live in about 10 hours! Can't wait for the Christmas advent puzzles.

    Poništi
  16. proslijedio/la je Tweet
    27. stu 2019.
    Poništi
  17. 26. stu 2019.

    Very cool and useful extension in order to attack consumers! I use it very often and really recommend it! It's also in the BApp Store.

    Poništi
  18. proslijedio/la je Tweet
    18. stu 2019.
    Poništi
  19. 15. stu 2019.

    Does anyone know the solution or approach of the Fortinet/networking CTF challenge? Was it needed to bruteforce the remaining 16 bits of the SA encryption key?

    Poništi
  20. proslijedio/la je Tweet
    11. stu 2019.
    Odgovor korisniku/ci

    Check this out...

    Poništi
  21. proslijedio/la je Tweet
    7. stu 2019.

    After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: (CVE-2019-3465) // cc

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·