Rafay BalochOvjeren akaunt

@rafaybaloch

Information Security Researcher and an author on Cybersecurity, Motivational speaker, featured on , , . RT ≠ Endorsement.

Pakistan
Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @rafaybaloch

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rafaybaloch

  1. Prikvačeni tweet
    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Don’t be afraid to get rejected. In 2013 my car hacking talk with got rejected because it wasn’t novel research. ¯\_(ツ)_/¯ We ended up presenting it on instead.

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  6. proslijedio/la je Tweet
    29. sij
    Poništi
  7. proslijedio/la je Tweet
    28. sij
    Poništi
  8. proslijedio/la je Tweet
    25. sij

    (Periodic reminder for the rest of us that Twitter's direct messages are "non-public," not private messages; aren't encrypted; can be subpoenaed per terms of service; can be viewed by 3rd-party apps; aren't secure conversation channels; and should not be used for organizing.)

    Screenshot of tweet about a Twitter user's DMs being subpoenaed.
    Poništi
  9. proslijedio/la je Tweet
    14. sij

    Excited to share that I’ll be speaking at 2020 on "Recapturing Glory - Return of the Persistent Threat Actors". Do consider attending the talk if you are attending this year, will be sharing insights from the trenches. More info here:

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    25. sij
    Poništi
  12. proslijedio/la je Tweet

    I've a hunch that SIM swap attacks are more prevalent than we are being told. For a number of reasons mostly

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    25. sij
    Odgovor korisniku/ci

    I know that you know a lot more than I do but you should read this blog:

    Poništi
  14. 18. sij

    This is astounding news for all freelancers in Pakistan, this step will drastically increase inward remittance flow and will discourage the use of methods such as cryptocurrencies, Payoneer for receiving payments.

    Poništi
  15. proslijedio/la je Tweet
    18. sij

    All your local admins on the Azure AD connect box are Domain Admins.

    Poništi
  16. 17. sij

    "One does not simply become a long-lost relative of a Nigerian prince!"

    Poništi
  17. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  19. 10. sij

    As indicated earlier disinformation and propaganda campaigns would also be a weapon of choice along with cyber sabotage attacks.

    Poništi
  20. proslijedio/la je Tweet
    8. sij

    This bug, fixed in latest Firefox, led to pretty interesting research, how you can exfiltrate data in Firefox with a single injection point (ie. no reloading iframes). I’m going to publish the trick soon.

    Poništi
  21. proslijedio/la je Tweet

    US government official tells CBS News that Iranian cyber capabilities have been assessed and US is operating at “high level” to respond/defend if necessary, describing posture as “readiness tested.”

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·