Tweetovi

Blokirali ste korisnika/cu @mugundhanbalaji

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mugundhanbalaji

  1. proslijedio/la je Tweet
    30. sij

    Today I'm very happy to announce that we released , an open-source security key implementation written on , based on OS and powered by a dongle dev kit! Learn more at: We're even releasing a custom 3D-printable enclosure!

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Thanks to , and countless others in in the community who stood by our colleagues. It was cool to see the community come together in this event!

    Poništi
  3. proslijedio/la je Tweet

    Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    A must see video from . INA inducted women into its fold when women fighting in Army was an alien subject no 1 had heard of. Remember, India is a country where sex, religion & caste should not matter. That is the India they gave life for.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  6. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Ever need to test a circuit breaker?

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    18. sij
    Odgovor korisnicima

    I’m interested in gamedev. I subscribedto GDC talks on YouTube, and I follow the /r/unity3d subreddit. And it was posted on this subreddit ;) I guess it is an example that interest into a topic that doesn’t seem directly related to infosec, can still be very valuable ;)

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Since this experience, I’ve always reminded my teams that interviews are: 1) Not about proving you are “smarter” than the candidate with random facts you just looked up 2) A two-way negotiation

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. sij

    We have a working proof-of-concept exploit for ‘Whose Curve is it Anyway?’ — NSA’s bug in Microsoft’s Crypto API. Read on for our explainer:

    Poništi
  12. proslijedio/la je Tweet
    15. sij

    ♥️♥️ 100 Indian Army personnel & 30 civilians walk through feet of snow for 4 hours to get heavily pregnant Mrs Shamima to hospital on a stretcher in Baramulla, J&K yesterday. Baby born just after they arrived at hospital. Mother & baby doing fine. ♥️♥️

    Poništi
  13. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    "The attacker utilized the anti-virus management console service account to distribute the malware across the network."

    Poništi
  17. proslijedio/la je Tweet
    8. sij
    Poništi
  18. proslijedio/la je Tweet
    7. sij

    Friends, Our malware samples have been restructured and are back online. 438,000+ samples. You can view them here:

    Poništi
  19. proslijedio/la je Tweet
    5. sij

    Iran’s spear phishing ... “I’ll send you a file including my photos but u should deactivate your anti virus to open it because I designed my photos with a photo album software, I hope you enjoy the photos I designed for the new year, they should be opened in your computer honey”

    Poništi
  20. proslijedio/la je Tweet
    3. sij
    Odgovor korisniku/ci

    You could also use the stolen process handle as the parent process using PROC_THREAD_ATTRIBUTE_PARENT_PROCESS attribute with CreateProcess and avoid needing to inject shellcode at all :-)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·