Quentin Herrera

@paragonsec

Director of at

/dev/random
Vrijeme pridruživanja: rujan 2017.

Medijski sadržaj

  1. 10. sij
    Odgovor korisnicima

    Wait... So this is the current picture of you?

  2. 26. stu 2019.

    The moment one pentest brings you 17 0-days in less than a week.

    Prikaži ovu nit
  3. 20. stu 2019.

    Fantastic summary of the movie Hotel Rwanda and the done by students at .

  4. 17. stu 2019.

    My face after finding 15 0-days in one application during a test. Let the 90 day disclosure time frame begin!

  5. 15. stu 2019.
    Odgovor korisniku/ci
  6. 7. stu 2019.

    This has to be the most amazing and creepy gift from a client I am pentesting this week. Sent by their security team as a friendly "hello" after I breached their network.

  7. 17. lis 2019.

    Want to waste time like and I did hunting down a bug? Find the UDP port of teams.exe: netstat -anbo and send a new line to it printf "\n" | nc -u 127.0.0.1 <teams.exe PID> -vvv

  8. 16. lis 2019.

    When your employee is bored and sees your weird hand movement... A meme is born... Thanks

  9. 17. ruj 2019.
  10. 17. pro 2018.

    Or even better yet: Get-History

    Prikaži ovu nit
  11. 17. pro 2018.

    Recently learned about a PowerShell history file similar to .bash_history! file: %AppData%\Microsoft\Windows\PowerShell\PSReadline Can read the contents through PowerShell by typing: cat (Get-PSReadlineOption).HistorySavePath

    Prikaži ovu nit
  12. 7. pro 2018.
    Odgovor korisnicima

    A one-liner version: systemd-run -t /bin/bash

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·