zjgzlp

@zjgzlp

打打ctf,打打lol,想想异世界,生活美滋滋----哈哈

Vrijeme pridruživanja: prosinac 2018.

Tweetovi

Blokirali ste korisnika/cu @zjgzlp

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zjgzlp

  1. proslijedio/la je Tweet
    18. sij

    We're getting close to the point where we'll be building in Blocks 😍

    Poništi
  2. proslijedio/la je Tweet
    3. sij

    "How to read a paper" Instead of reading top to bottom 1. First read title and keywords: is it relevant? 2. Read conclusion: worth reading more? 4. Figures/tables 5. Introduction 6. Everything else * You can stop reading at any point * Take notes

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    Hooray! The project is in the top three most upvoted products of 2019 on Product Hunt! Isn't this awesome?! Yes, sir, it is! 🤠

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    (1/n) "Useful Linux commands series" How to take notes from terminal? Step1: Add this code to ~/.bashrc notes() { echo $1 >> /Desktop/notes.md } Step2: Now you can run this command notes "Anything you want to note"

    Poništi
  5. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    5. ožu 2019.

    Starting a new tutorial series on Heap Exploitation. Part 1 is live! ✨ “Understanding the Glibc Heap Implementation”

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    17. sij

    Live now: BadBlood an Active Directory Object Creator and Security Generator

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    We have roughly 250 team slots left. To reiterate: No, there's no limit on team size, and no, you don't have to use Metasploit for the challenges. Come play with us!

    Poništi
  9. proslijedio/la je Tweet
    24. pro 2019.

    Check out my GitHub repo for some Windows memory hacking code written in C++. It's pretty simple right now, I plan on adding more as time goes on!

    Poništi
  10. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. sij

    I feel like it's an odd assumption that disk encryption on iPhone can be universally broken: to my (limited) understanding the key is derived from the passcode (& some SEP secrets), so it is at least as strong as the passcode

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. sij

    I've been thinking about how it's hard to share things and ask questions and put work out in the world when you're a beginner, and I have some suggestions for ways we as a community of teachers (yes I mean literally everyone who teaches anyone anything) to do better.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    11. sij

    New video incoming! 🚨 In this video, we talk APIs. What they are, where to find them, and most importantly how to test them for bugs! We cover: API recon, the most common API bugs and teach you how to find them

    Poništi
  14. proslijedio/la je Tweet

    Sweden made my life complete 🌌✔️ I was told I wouldn’t be able to see the during a full moon but was like “hold my beer, I got this!” (plus the moon made the scene even more gorgeous imo!) Is seeing the on your wish list? Ask me any Q’s ⤵️

    , , i još njih 6
    Poništi
  15. proslijedio/la je Tweet
    10. sij

    Detection: Exploited with 1 POST + 1 GET reqest. As mentioned before, you can look for "/vpns/" in the path, but also "../" in header values for the POST. Probably shouldn't say *which* header at this point. This will be followed by a GET request for a file ending in ".xml".

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    9. sij

    While waiting for writeup from , I just found that this is not his first writeup. I bet no one ever read this, great post, thanks for sharing

    Poništi
  18. proslijedio/la je Tweet
    1. tra 2019.

    Announcing my very own free, open source and online course: "Reverse Engineer iOS Applications" 📱 My favourite personal project yet. It was a lot of fun and hard work but I hope it'll help drive more researchers to mobile security. Feedback always welcome

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    CVE-2019-19781 start with a path traversal on the "vpns" folder: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf Patched if => HTTP/1.1 403 Forbidden

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·