pk_sec

@sec_pk

Senior Security Analyst, infosec enthusiast

Vrijeme pridruživanja: rujan 2019.

Tweetovi

Blokirali ste korisnika/cu @sec_pk

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sec_pk

  1. Prikvačeni tweet
    17. sij
    Odgovor korisniku/ci

    thank you for the awesome explanation, I was able to do the same thank you for the github repo with detailed explanation of the commands.

    Poništi
  2. proslijedio/la je Tweet
    15. ruj 2019.
    Poništi
  3. proslijedio/la je Tweet
    prije 1 sat

    'Cyber security incident' takes its Toll on Aussie delivery giant as box-tracking boxen yanked offline

    Poništi
  4. proslijedio/la je Tweet
    prije 20 sati

    - multiple high severity in WhatsApp potentially allowed remote attackers to compromise the security of billions of users including remotely stealing files from the victims' Windows or Mac computers: CVE-2019-18426

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    python3 -m http.server 8080 # Start a simple webserver using python3 on external port 8080 and use the current directory you are in as the document root. Be careful with what you expose to the world. Use --bind 127.0.0.1 if you want to make it local only.

    Poništi
  6. proslijedio/la je Tweet
    prije 4 sata

    New blog post: Simple Remote Code Execution Vulnerability Examples for Beginners

    Poništi
  7. proslijedio/la je Tweet
    prije 21 sat

    i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    prije 18 sati

    I just published Hijacking shared report links in Google Data Studio

    Poništi
  9. proslijedio/la je Tweet
    prije 19 sati
    Poništi
  10. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  11. proslijedio/la je Tweet
    prije 4 sata

    is issuing patches for five critical flaws that have been discovered in Cisco Discovery Protocol, the info-sharing layer that maps all Cisco equipment on a network. (via )

    Poništi
  12. proslijedio/la je Tweet
    prije 13 sati

    From persistent XSS to file system read, nice writeup by

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    prije 22 sata

    If you want to understand what happened with Shadow and the failure of the Iowa Caucus app you have to understand how electoral campaign tech work is done and funded. Let me tell you a story to make sense of it.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    prije 16 sati
    Poništi
  16. proslijedio/la je Tweet
    prije 24 sata

    So yes, the latest sudo bug (CVE-2019-18634) is fairly trivial to exploit giving any user root access. Tested on Ubuntu and a stock Mint install. Upgrade sudo or ensure pwfeedback is disabled!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    prije 23 sata

    A couple of people asked for my 'XSS for 2020' cheatsheet in PDF format, so I went ahead and made it today. Enjoy. :)

    Poništi
  19. proslijedio/la je Tweet
    4. velj

    Tuesday Technical Tweet Thread Time! Let's go on the roller coaster of what happens at a low level when a DNS server sends an 4,000 byte EDNS0 response to a client whose MTU is 1200 bytes. Confused already? don't worry, we'll break it down. I promise it's super interesting.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    prije 4 sata

    CDPwn vulnerabilities impact tens of millions of enterprise devices - CDPwn impacts Cisco's Discovery Protocol (CDP) - CDPwn = 4 RCEs + 1 DOS - LAN exploitable, not via WAN - ideal for escalating access and taking over entire networks

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    3. velj

    We've determined that an authentication certificate has expired causing, users to have issues using the service. We're developing a fix to apply a new certificate to the service which will remediate impact. Further updates can be found under TM202916 in the admin center.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·