Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @saifuddin_amri
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @saifuddin_amri
-
Prikvačeni tweet
5 years ahead
If 6 months of hard work & hardcore focus can do that, imagine what full year can do. What you do this year have a huge impact on your next year coming.
So keep the hard work, keep grinding & keep hustling ! 
pic.twitter.com/1enfhOb7oR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
So it's not that Windows uses the wrong curve parameters or anything like that, it's that at some point the key used to index into a validated cert cache is (serial, pub) when it should be (serial, pub, params). As they say, one of the hardest problems in CS is caching.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
What you're trying to find is the private key given the public key. You cannot find the original private key for the original params, but you can trivially craft parameters in such a way to make a private key of 1 "happen" to correspond to the original public key.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
That epic Microsoft moment

#cve20200601#curveball Recently worked on#mimikatz and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)pic.twitter.com/EayEuFVv1JPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
Ho, by the way,
#curveball#cve20200601 is not only about TLS & Authenticode... it's also for S/MIME and other signatures. Yes, it's also valid against#Outlook mail signature verification
I hope nobody rely on it for legal / workflow validationpic.twitter.com/xds8l2gSILPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
Don't take any chances, make sure your data is secure.
#smallbusiness#atx#cybersecurity#datasecurityhttps://hubs.ly/H0myxVB0Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
4 customer service trends you need to know in 2020
@jthomasgriffinhttp://on.inc.com/kpcwQfkHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
CryptoAPI PoC CVE-2020-0601https://github.com/kudelskisecurity/chainoffools/blob/master/README.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
New blog post "Analysis Of Unusual ZIP Files"https://blog.didierstevens.com/2020/01/06/analysis-of-unusual-zip-files/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
This attack did occur, but it wasn’t Mitnick that performed it. Also, Shimomura’s machine was already owned before Kevin finally was given access, and it was logged. I’ve seen the logs.https://twitter.com/todayininfosec/status/1209958197034913797 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
In Infosec, we need to consider Confidentiality Integrity Availability We often forget Availability - keeping something available often runs contrary to security. Interesting story about how handling the encoding of years on EMV cards led to downtime: https://www.lightbluetouchpaper.org/2010/01/19/encoding-integers-in-the-emv-protocol/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
1994: Kevin Mitnick allegedly performed a remote attack against Tsutomu Shimomura’s personal computer, gaining access by using source address spoofing and TCP sequence prediction. But there's no proof he did it and it's generally accepted he lacked the required technical skills.pic.twitter.com/u28HdFskln
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
For the next 6 months: 1. I will focus on myself 2. Myself is my 1st priority. Put aside unnecessary things & bullshit issue. 3. It's only me, myself & my career 4. Invest 10000% energy into myself 5. Don't lose focus & work harder ! Happy working peeps !
#Motivation#Successpic.twitter.com/NMkKDmOxRD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
I keep telling y'all that "full stack" is a trap. Nobody wants to talk about it. I was honestly surprised when I learned that a lot of devs are taught to want that. As opposed to be able to build up competency incrementally.https://twitter.com/webber_tweets/status/1209018843269652481 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
TIP: You should go through all web results for all your usernames past and present, and change all the user details to junk, BEFORE you delete the account (if that's an option). Often websites only HIDE deactivated accounts - if a hacker dumps the database all your stuff is there
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
When are we going to impose fines so hefty for poor cybersecurity that can seriously impact or shut down a company? Over 267M Facebook users had names, phone numbers leaked on dark web https://fxn.ws/2EB0t6w
#FoxNews#ETSU#CyberSecurity#CyberAwareHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
How to Evade AV: Evading AV with OWASP-ZSC
#evadeAV#AV#owaspzsc#cybersecurity#cyberwarrior http://bit.ly/2pZJjdG pic.twitter.com/ZJ4sm3WbQw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
Hackers attack over 50,000 websites per day. The only way to stay secure is to understand and implement website security best practices.
@CyberExpertsUS#cybersecurity https://buff.ly/36ArKTx pic.twitter.com/vQUpMnZ46L
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
How I created and launched a startup from an internet café in Zimbabwe, Africa https://www.readysetstartup.com/?p=964
#startuppic.twitter.com/DU8T6hwKj9
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Saifuddin Amri proslijedio/la je Tweet
The 6 Things to Watch Out For When You're New in the Office TAG a friend or colleague who can relate!pic.twitter.com/akovZ72RaW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.