|
44CON
@
44CON
London, UK
|
|
UK's best combined Information Security Conference and training event. DM's not monitored. Newsletter out every Tuesday: bit.ly/2VVlS16
|
|
|
6.112
Tweetovi
|
69
Pratim
|
10.624
Osobe koje vas prate
|
| Tweetovi |
|
44CON
@44CON
|
7 h |
|
Exploring the iOS screen frame-buffer– a kernel reversing experiment dlvr.it/RPJZVy pic.twitter.com/hlKW9p12fX
|
||
|
|
||
|
44CON
@44CON
|
9 h |
|
They definitely need to be a thing.
|
||
|
|
||
|
44CON
@44CON
|
9 h |
|
Avocent IP KVMs hacking - or how I got cables from any vendor to work on my Dell 1082DS (x-post from /r/homelab) dlvr.it/RPJBRS
|
||
|
|
||
|
44CON
@44CON
|
10 h |
|
AMSI (Antimalware Scripting Interface) bypass by patching memory seen in the wild dlvr.it/RPHyww pic.twitter.com/b6d0A0uuA8
|
||
|
|
||
|
44CON
@44CON
|
12 h |
|
Google introduces OpenSk, an Open Source security key implementation dlvr.it/RPHYzL
|
||
|
|
||
|
44CON
@44CON
|
15 h |
|
Get all the latest training and #44CON info in one weekly email. Next issue out tomorrow ift.tt/2FCh4YE
|
||
|
|
||
|
44CON
@44CON
|
15 h |
|
Exploit PoC: HyperV Admin to System dlvr.it/RPH7ng pic.twitter.com/VVUkmIWlGR
|
||
|
|
||
|
44CON
@44CON
|
18 h |
|
emotet_protection_tools: This repository provides tools to fight against Emotet malware. You can protect your system using these tools dlvr.it/RPGkX0 pic.twitter.com/M1qvM13RW8
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
Kraken Identifies Critical Flaw in Trezor Hardware Wallets dlvr.it/RPFmB5 #featured pic.twitter.com/sXuxLZMsuC
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
I’ve been developing Kali i3-gaps’ ISO since November and I finally made it fully functional. If you want to give it a try, check it out over at my Gitlab. dlvr.it/RPDqKn
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers dlvr.it/RPDZLj
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
Detection Engineering using Apple’s Endpoint Security Framework dlvr.it/RPDJlc pic.twitter.com/1uTgsZzBxi
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
"How to set up Secure LDAP for Active Directory — Astrix" dlvr.it/RPD2JS pic.twitter.com/nBmRuzwItr
|
||
|
|
||
|
44CON
@44CON
|
2. velj |
|
Samesite by Default and What It Means for Bug Bounty Hunters dlvr.it/RPCvYW
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
OK Google: bypass the authentication! dlvr.it/RPC9sv
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
Unwinding RTCore dlvr.it/RPBy8J pic.twitter.com/JcPpad31b4
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS | SentinelOne dlvr.it/RPBhLz #bypass #Gatekeeper pic.twitter.com/1N2ET2E2sm
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
Azure Sentinel webinar: Threat Hunting (part 2) dlvr.it/RPBNN7
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
An attacker logged into the honeypot and ran a batch file that created a vbs script that attempted to download a possible coin miner. The attacker then downloaded an application named Defender Control to turn off Defender. See the timeline, details, and… dlvr.it/RPBCBQ pic.twitter.com/dhLEptF5v3
|
||
|
|
||
|
44CON
@44CON
|
1. velj |
|
Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure dlvr.it/RP9vxh #Azure #azureStack pic.twitter.com/PjodV4tMHU
|
||
|
|
||