Sesha

@security_sesha

Script Kiddie. Tweets are my bookmarks to access those on PC, mobile or in transit.

NJTransit and PATH
Vrijeme pridruživanja: listopad 2012.

Tweetovi

Blokirali ste korisnika/cu @security_sesha

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @security_sesha

  1. Prikvačeni tweet
    13. ožu 2019.

    Two months later Elite hacker. That’s a long lovely learning journey...

    Prikaži ovu nit
    Poništi
  2. prije 3 sata

    (Almost) All The Ways to File Transfer by PenTest-duck

    Poništi
  3. prije 20 sati
    Poništi
  4. proslijedio/la je Tweet
    1. velj
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  6. Poništi
  7. 2. velj
    Poništi
  8. 2. velj

    Techonology Inside Out – [Ultimate Guide] How SSH works?

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    “Engineering is the closest thing to magic that exists in the world.” —Elon Reeve Musk

    Poništi
  11. 1. velj
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    After three years of preparation, our SAMM team has delivered version 2 of SAMM! More details here: A big thanks to our community, your feedback, corrections, questions, input, and encouragement. SAMM version 2 is for you!

    Poništi
  13. proslijedio/la je Tweet
    1. velj
    Poništi
  14. proslijedio/la je Tweet
    30. sij
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    In his post, "Detection Engineering using Apple’s Endpoint Security Framework," illustrates how you can use ESF to detect In-Memory Execution on endpoints. Check it out:

    Poništi
  16. proslijedio/la je Tweet
    30. sij
    Poništi
  17. proslijedio/la je Tweet
    30. sij

    📚 tl;dr sec 22 * slides from , tool by * & on decrypting WhatsApp messages * on Kubernetes security monitoring @ scale using

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    28. sij
    Odgovor korisniku/ci
    Poništi
  19. proslijedio/la je Tweet

    Learn how to perform automated response and remediation with AWS Security Hub.

    Architectural diagram
    Poništi
  20. proslijedio/la je Tweet
    29. sij

    We now have 116 awesome labs on the Web Security Academy. We'll be adding some more soon.

    Poništi
  21. proslijedio/la je Tweet
    29. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·