JInTech

@rammarj

From underground to underground. Trying harder & smarter

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @rammarj

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rammarj

  1. proslijedio/la je Tweet
    30. sij
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  3. proslijedio/la je Tweet
    28. sij
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    network protocols

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Finally, the disclosure is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs via cache eviction despite current mitigations: , Andrew Kwong, Daniel Genkin and

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  8. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  9. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  10. proslijedio/la je Tweet
    5. sij

    Account Takeover via HTTP Request Smuggling (detecting and exploiting HTTP Request Smuggling by chaining different bugs with it to get critical vulnerabilities) : cc HTTP Request Smuggling + IDOR :

    Poništi
  11. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.

    Reverse Engineering Resource Collection. 3000+ open source tools, ~600 blog posts.

    Poništi
  13. proslijedio/la je Tweet
    18. pro 2019.

    Friends, 29a zine issue #3 is now live. Incredible issue with tons of incredible code. Check it out.

    Poništi
  14. proslijedio/la je Tweet
    12. pro 2019.

    Project Zero: Five Years of 'Make 0Day Hard' talk from BlackHat USA 2019 by is now on YouTube! Slides: Video:

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi
  17. proslijedio/la je Tweet
    28. stu 2019.

    Safari Adventure - a dive into Apple Browser Internals

    Poništi
  18. proslijedio/la je Tweet
    27. stu 2019.

    Using Burp Suite match and replace settings to escalate your user privileges and find hidden features.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Correction: Take a deep dive into a winning bug as breaks down an entry used by (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver.

    Poništi
  20. proslijedio/la je Tweet
    25. stu 2019.

    just published my blog on solving the vm1 challenge by using cutter () for beginners

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·