navs

@the_navs

Security Researcher at █████████████              Strike First. Strike Hard. No Mercy.

Austin, TX
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @the_navs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @the_navs

  1. proslijedio/la je Tweet
    4. velj

    I've worked professionally in software for 18 years and I can say with certainty that you should not use software for anything

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  3. proslijedio/la je Tweet
    29. pro 2019.

    I'm pretty sick of devices that require vendor 'clouds' to continue working; especially when they do consumer hostile things like this. I've tracked down a Sonos One so I'm going to start seeing whether they can be 'liberated', even after being recycled.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. pro 2019.

    Python2 is finally being deprecated and thus becomes illegal. The binary string handling was too powerful and resulted in many many exploit scripts. Forcing attackers to move to python3 or ruby will have massive positive impact on defense!

    Poništi
  5. proslijedio/la je Tweet
    1. pro 2019.

    Hey, , let's have a fight about disclosure.

    Poništi
  6. proslijedio/la je Tweet
    19. stu 2019.
    Odgovor korisniku/ci

    There was a time you could look at 250 lines of a .c and be pretty sure who wrote it.

    Poništi
  7. proslijedio/la je Tweet
    17. stu 2019.

    in my experience, 90% of the bugs discovered are in the first or last 10% of an engagement * first 10%: finding shallow stuff that should have been disco’d already * middle 80%: tooling/deeper understanding of target * last 10%: watershed/make-it-rain

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    14. stu 2019.

    A lot of people ask my opinion on reverse engineering tools. I don’t have any one in particular I prefer over the others, they’re all good for different uses: 1/4

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    27. ruj 2019.

    So is this Apple's release of research phones? I expected them to be under NDA, not available online and in store.

    Poništi
  11. proslijedio/la je Tweet

    Me: I don't get why people don't like the IDA Pro debugger.. it's nice having everything in one place... Me after 4 crashes, arbitrary GUI lockups, memory errors, database inconsistencies, and dubious ability to save dynamic changes to db: ...Got it.

    Poništi
  12. proslijedio/la je Tweet
    14. kol 2019.

    and I just pushed our BlackHat 2019 slides here: Outlook and Hyper-V exploits on the menu!

    Poništi
  13. proslijedio/la je Tweet
    15. srp 2019.
    Poništi
  14. proslijedio/la je Tweet
    8. srp 2019.

    Suppose you have a file delete how would you get RCE from it? For context I can delete ANY file from my target. Running Postgres/JBOSS with hot deployment.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. lip 2019.

    We hacked our way to executing an interactive bash shell on iOS on QEMU. We based the research on the work done by . Thanks!

    Poništi
  16. proslijedio/la je Tweet
    7. lip 2019.

    A visualization of how Grapl's new risk based analysis and lensing works. First image: Graph signatures + their respective risk scores Second image: How the lens views each signature, sums up their scores, and adds bonus to the score when risks overlap on a given node.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. lip 2019.

    Some seats available for +my class Malware analyst trying to RE that 0day? Pentester looking to roll your own exploits? Aspiring to work at Raytheon? Want to take on pwn 1000 next CTF? Introduction To Modern Binary Exploitation 💻💥👉

    Poništi
  18. proslijedio/la je Tweet
    27. tra 2019.

    Most important career milestone?

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    24. tra 2019.

    Got together with three of the smartest hackers I know, fellow alums , , and to write about the risks of Huawei risk mitigation for .

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    24. tra 2019.

    Today the UK approved use, risks of Huawei 5G have not been thoroughly vetted. Economic expediency is underwritten by access-enabling infrastructure.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·