Jessey Bullock

@ret2kw

Security Person at Company

Vrijeme pridruživanja: listopad 2011.

Tweetovi

Blokirali ste korisnika/cu @ret2kw

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ret2kw

  1. proslijedio/la je Tweet
    28. sij

    Over the past few years I've spent 100s (1000s?) of hours studying how companies have scaled their security. Here are my slides that distill what I've learned- the big, scalable, systematic wins that measurably improve your security posture.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  3. proslijedio/la je Tweet
    14. sij

    Anticheats such as BattlEye have been trying to detect generic hypervisors, in particular those prevalent in the cheating community (DdiMon and hvpp), by using time-based detections. Here's some advice on that for the developers.

    Poništi
  4. proslijedio/la je Tweet
    13. sij

    CVE-2019-19781 post-exploitation notes: If you are seeing attackers reading your /flash/nsconfig/ns.conf file then you need to change all passwords. The SHA512 passwords are easily crackable with hashcat.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Announcing BLAKE3! 🥳 * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: Try it: cargo install b3sum

    Poništi
  6. proslijedio/la je Tweet

    🎉 First security blogpost of 2020 🎉 Some people ask me, so here is how to start fuzzing APIs of JavaScript engines like Chrome/V8. In this blogpost, I'm using: ✅ Dharma/Domato ✅ Chrome/v8 ASan pre-built ✅ Honggfuzz ;)

    Poništi
  7. proslijedio/la je Tweet
    9. pro 2019.

    WireGuard has been merged to net-next, which means it will be in mainline Linux for 5.6. Exciting day!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  9. proslijedio/la je Tweet
    6. sij

    BattlEye has for the past year been detecting unknown cheats using memory heuristics combined with a method known as stack walking:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    4. sij

    AWS Nitro Enclaves are little "sidecar" isolated VMs with no network access or storage that you can create and communicate to only from an EC2 VM to eg store secrets and keys in, do crypto. they also have attestation. Currently in preview.

    Poništi
  11. proslijedio/la je Tweet

    Ever wanted to inject a shared library into an already-running linux process, without using ptrace? Well, now you can...

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. pro 2019.

    endlessh : SSH tarpit that slowly sends an endless banner : More :

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.

    An Android app to read and write MIFARE Ultralight EV1 tags

    Poništi
  14. proslijedio/la je Tweet

    Easy UNIX piping! No config options! Modern crypto! No keyrings! Public keys that fit in a tweet! No more looking up how to encrypt a file on StackOverflow. 💥 age1t7r9prsqc3w3x4auqq7y8zplrfsddmf8z97hct68gmhea2l34f9q63h2kp Try it out and send feedback 👉

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    I just published a massive guide for on using reverse image search engines for digital investigation. I test out the Big Three services, ranking them with a running scorecard, and detail some creative search strategies at the end of the guide.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    26. pro 2019.

    icymi (I did!) here's the security audit results:

    Poništi
  18. proslijedio/la je Tweet

    Looking for an exceptional candidate to join my exceptional team at Apple :) Deets below if you’re interested

    Poništi
  19. Poništi
  20. proslijedio/la je Tweet
    19. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·