Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @sec_pk
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sec_pk
-
Prikvačeni tweet
@ghidraninja thank you for the awesome explanation, I was able to do the same@ollypwn thank you for the github repo with detailed explanation of the commands.pic.twitter.com/r4aVF1nZMv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
How to bypass Android certificate pinning and intercept SSL traffic
#bugbounty#bugbountytiphttps://vavkamil.cz/2019/09/15/how-to-bypass-android-certificate-pinning-and-intercept-ssl-traffic/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
'Cyber security incident' takes its Toll on Aussie delivery giant as box-tracking boxen yanked offline http://tinyurl.com/r5yqkyu
#hackingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
#WhatsApp - multiple high severity#vulnerabilities in WhatsApp potentially allowed remote attackers to compromise the security of billions of users including remotely stealing files from the victims' Windows or Mac computers: CVE-2019-18426https://thehackernews.com/2020/02/hack-whatsapp-web.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
python3 -m http.server 8080 # Start a simple webserver using python3 on external port 8080 and use the current directory you are in as the document root. Be careful with what you expose to the world. Use --bind 127.0.0.1 if you want to make it local only.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
New blog post: Simple Remote Code Execution Vulnerability Examples for Beginnershttps://link.medium.com/qEZHJHzNP3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers https://nvd.nist.gov/vuln/detail/CVE-2019-18634 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
I just published Hijacking shared report links in Google Data Studio https://link.medium.com/rSToGHVOO3
#googlevrp#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
pk_sec proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
#Cisco is issuing patches for five critical#security flaws that have been discovered in Cisco Discovery Protocol, the info-sharing layer that maps all Cisco equipment on a network. (via@ArmisSecurity)https://threatpost.com/critical-cisco-cdpwn-flaws-network-segmentation/152546/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
From persistent XSS to file system read, nice writeup by
@WeizmanGalhttp://bit.ly/370YbJHHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
Flaws in WhatsApp’s desktop app allowed remote access to files https://arstechnica.com/information-technology/2020/02/flaws-in-whatsapps-desktop-app-allowed-remote-access-to-files/?utm_brand=arstechnica&utm_source=twitter&utm_social-type=owned&utm_medium=social … by
@thepacketratHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
If you want to understand what happened with Shadow and the failure of the Iowa Caucus app you have to understand how electoral campaign tech work is done and funded. Let me tell you a story to make sense of it.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
Why Discord is switching from Go to Rusthttps://blog.discordapp.com/why-discord-is-switching-from-go-to-rust-a190bbca2b1f …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
So yes, the latest sudo bug (CVE-2019-18634) is fairly trivial to exploit giving any user root access. Tested on Ubuntu and a stock Mint install. Upgrade sudo or ensure pwfeedback is disabled!
#CVE#poc#sudopic.twitter.com/CWE75DGNeKPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
A couple of people asked for my 'XSS for 2020' cheatsheet in PDF format, so I went ahead and made it today. Enjoy. :) https://netsec.expert/public/serve/xss_2020.pdf …
#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
Tuesday Technical Tweet Thread Time! Let's go on the roller coaster of what happens at a low level when a DNS server sends an 4,000 byte EDNS0 response to a client whose MTU is 1200 bytes. Confused already? don't worry, we'll break it down. I promise it's super interesting.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
CDPwn vulnerabilities impact tens of millions of enterprise devices - CDPwn impacts Cisco's Discovery Protocol (CDP) - CDPwn = 4 RCEs + 1 DOS - LAN exploitable, not via WAN - ideal for escalating access and taking over entire networks https://www.zdnet.com/article/cdpwn-vulnerabilities-impact-tens-of-millions-of-enterprise-devices/ …pic.twitter.com/eOoZIl2T8R
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
pk_sec proslijedio/la je Tweet
We've determined that an authentication certificate has expired causing, users to have issues using the service. We're developing a fix to apply a new certificate to the service which will remediate impact. Further updates can be found under TM202916 in the admin center.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.