Tweetovi

Blokirali ste korisnika/cu @rev313

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rev313

  1. proslijedio/la je Tweet

    Magic Unicorn v3.8.2 released. Changes DllImport functionality for signature bypasses.

    Poništi
  2. proslijedio/la je Tweet

    A new security flaw (CVE-2020-6007) in Philips Smart Light Bulbs 💡 could let remote attackers gain access to your entire WiFi network (over-the-air without cracking password) & launch further attacks against other devices connected to the same. Details:

    Poništi
  3. proslijedio/la je Tweet

    A 'technical error' in Google Takeout service accidentally shared private videos (uploaded to Photos) of some users with other accounts. Google admitted the latest mishap yesterday in a security alert sent quietly to affected users.

    Poništi
  4. proslijedio/la je Tweet

    Twitter warns hackers exploited an API bug on its platform to inappropriately match and learn linked phone numbers of millions of users. Based on IP addresses engaged in the attack, believes some of them may have ties to state-sponsored actors.

    Poništi
  5. proslijedio/la je Tweet

    🔥 CVE-2019-18426 for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    That’s genius. I wonder how many ssrf I’ve given up on and could have made work with this... 😭

    Poništi
  7. proslijedio/la je Tweet

    Did some massive bug hunting tonight. New release out.

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Just discovered a new 0-day RCE in a well known network monitoring software, the code is well written which took me sometime to find the vulnerability. you can exploit it without authentication under some conditions. stay tuned for the full exploit code and a detailed article!

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  11. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  12. proslijedio/la je Tweet
    3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  13. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  15. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  17. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  18. proslijedio/la je Tweet
    3. velj
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  20. proslijedio/la je Tweet
    3. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·