Rogan Dawes

@RoganDawes

Researcher . Open DMs

Johannesburg
Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @RoganDawes

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RoganDawes

  1. 4. velj

    Thanks to all the new followers! 🤓

    1337
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Make your own hardware security key by flashing 's OpenSK firmware on a nRF52840 Dongle:

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    This ‘No honking’ ad by Mumbai Police is pure gold 🙏🏻 Honk only if you are ready to wait 😊

    Prikaži ovu nit
    Poništi
  4. 2. velj

    Eggy toast, breakfast of champions!

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    South African police arrest government worker who hacked the Department of Employment & Labour and stole login details for 300 fellow employees

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  8. proslijedio/la je Tweet
    29. sij

    “To overcome these limitations, we drew inspiration from the Morris worm... which exploited the DEBUG vulnerability in Sendmail by executing the body of a mail as a shell script” oss-security - LPE and RCE in OpenSMTPD (CVE-2020-7247)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    We've booked Rhapsodys Centurion for Saturday the 8th of February from 11 am to 1 pm. will be talking about HID attacks over RF, from MouseJacking to LOGITacker. See you there!

    Poništi
  10. proslijedio/la je Tweet
    27. sij
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    of is teaching a 2-day training on close-quarter hacking at ! Learn to use tools to gain physical or nearby access to an environment using Badge Cloning, HID attacks, & RF peripheral hacks. Enroll here ➡️

    Poništi
  12. proslijedio/la je Tweet
    23. sij
    Poništi
  13. proslijedio/la je Tweet
    25. sij

    Update the list of current USB cables with implants for keystroke injection attacks & more

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. sij

    The surgeon’s hand is visibly trembling. The scalpel’s blade glints as it catches the light. I’m a medical student, scrubbed in on the case. I’m not going into surgery, I know that. I’m here for him. He glances at me and notices I’m holding my breath. He grins. “Relax.” 1/

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    25. sij

    Can we talk for just a moment about really awful, poorly designed infosec training lab environments? Like ones being put in front of college students or new hires? That they have to get through to proceed? It’s 2020 and I keep seeing this crap.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    24. sij

    Open Wifi Security (Friday evening rant) 1) Yes, at our hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to. Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    22. sij

    SharpRDP, a .NET console application that can be used to perform authenticated command execution against a remote target for the purposes of lateral movement through RDP without the need of a GUI client or SOCKS proxy. Send Win+R through RDP.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. sij

    Leverage the Remote Desktop Protocol (RDP) for the purposes of non-graphical authenticated remote command execution against a target. 

    Poništi
  19. proslijedio/la je Tweet
    22. sij

    Everyone likes free training. Right? The Adversary Tactics: Powershell course has been retired from SpecterOps delivery. The course material has been made public.

    Poništi
  20. proslijedio/la je Tweet

    I've always secretly wanted amazing Mallet to work with stuff like this and maybe now is the time. If you don't know Mallet, well.. this is why Rogan is one of my heroes. He's just epic at building stuff ahead of its time

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·