Tweetovi

Blokirali ste korisnika/cu @noperator

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @noperator

  1. Prikvačeni tweet
    9. sij

    Got a working reverse shell exploit for CVE-2019-19781, pre-auth RCE in / Gateway/ADC SSL VPN

    Poništi
  2. 26. sij

    If you haven't voted for my post yet, please do! Poll ends in a few hours. Thanks so much :)

    Poništi
  3. 24. sij
    Prikaži ovu nit
    Poništi
  4. 24. sij

    Voting closes in two days :) Since the poll requires ranking at least three entries, I'd suggest submitting: 1. Remote Code Execution via Insecure Deserialization in Telerik UI 2. Exploring Continuous Integration Services as a Bug Bounty Hunter 3. Pre-Auth RCE On Leading SSL VPNs

    Prikaži ovu nit
    Poništi
  5. 24. sij

    My blog post been nominated for inclusion in PortSwigger’s list of Top 10 Web Hacking Techniques of 2019! If you don’t mind, would you please vote for “Remote Code Execution via Insecure Deserialization in Telerik UI” at the following poll?

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    21. sij

    This past December, Barrett Darnell () competed in the Tournament of Champions as part of the winning team. Find out how to get the most out of your and put what you learn into practice by following his example:

    Poništi
  7. proslijedio/la je Tweet

    My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.

    Poništi
  8. proslijedio/la je Tweet
    12. sij

    What the internet looks like with CVE-2019-19781, meanwhile is that guy silently eating his kabab and watching...

    Poništi
  9. 11. sij

    just updated their security bulletin for CVE-2019-1978. No firmware updates until 20 Jan, at the earliest.

    Poništi
  10. proslijedio/la je Tweet

    Some of the biggest and most costly breaches in recent memory caused by 20 year old security bugs in security products by security vendors: - Fortigate SSL VPN. - Citrix ADC (SSL VPN). - Pulse Secure (SSL VPN). In each case they all lacked basic security mitigations.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    29. pro 2019.

    Are you in IT security yet not allowed to patch vulnerable systems? Do you have five bosses, each of which must approve changes? Enter Undocumented Admin! Friendly white-hat hackers who gently access your vulnerable systems and patch them for you Signup

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.
    Poništi
  13. 15. pro 2019.
    Poništi
  14. 13. pro 2019.

    Just published a PoC exploit for CVE-2019-18935 (), RCE via insecure deserialization affecting Telerik UI. See full write-up below. Thanks to for discovering this issue, and for collaborating on exploit dev.

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Wooooot, Rob Ragan and Alex DeFreese talk about agile frameworks in the context of pentesting. ..and I got an honorable mention along with \o/ 🎉🍾

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    This advisory highlights critical + high-risk issues in the healthcare software – . Please update to the latest version ASAP:

    Poništi
  17. 3. pro 2019.

    might be the first infosec joke at which I've actually laughed out loud

    Poništi
  18. proslijedio/la je Tweet
    2. stu 2019.
    Odgovor korisniku/ci

    alright so on today's vulnerability talk, I'm going to showcase a remote code execution by breaking into your home, and using your computer

    Poništi
  19. 23. lis 2019.

    need to buy a PS4 so I can teach my kids about

    Poništi
  20. proslijedio/la je Tweet

    On Twitter, if you blink at the wrong moment you'll miss some great web security research. We recently launched a quality-over-quantity subreddit to help address this:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·