-
-
Hardest and profitable attack vector - wormable, pwn the product w/o any user interactions.
-
A vulnerability in the scan engine can be triggered via email. Remote, wormable, and no user interaction required. That would be realistic, I've found and exploited dozens.
- 14 more replies
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
But a car tire attack through TPMS is very useful
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think they just exposed what part of their software they are most confident about that it’s almost bug free (“please don’t look at the rest”).
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Mapping "finders"? HackerOne is based in USA. Quote from "BOUNTIES" section: "To be eligible to receive a Bounty, however, you must provide HackerOne with accurate, complete and up-to-date information about you" https://www.hackerone.com/terms/finder
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.