Twitter | Pretraživanje | |
David Valles
P455i0n4t3 ab0ut Inf053c!
24.663
Tweetovi
941
Pratim
568
Osobe koje vas prate
Tweetovi
David Valles proslijedio/la je tweet
NVISO Labs 4. velj
New blog post: The return of the spoof part 2: Command line spoofing | by
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
y0n3uchy 10 h
Today I presented a rough idea of a (brand-new?) data exfiltration technique with regular expression injection and timing attack at OWASP Night (Japan). Enjoy!
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Nicolas Krassas 15 h
Introduction to mobile network intrusions from a mobile phone
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Check Point Research 8 h
Executing code on Philips Hue Smart Hub through the ZigBee protocol, and infiltrating your way into the internal network. Technical details will follow soon.
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Malware Unicorn 14 h
Errors are red. Kernel panics are blue. This crash dump is a sign, That I’m vulnerable to you ;)
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Tokio 4. velj
How Discord went from millisecond latencies to microseconds by switching from Go to and Tokio
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
David Rowe 4. velj
Adding a Backdoor to AD in 400 Milliseconds
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
mRr3b00t @ planet earth 4. velj
I've just written a blog on my experiances with Active Directory hardening but also on how using can take some of the sting out of the tail of discovery and remedial projects! Honestly this tool is awesome!
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
/r/netsec 12 h
From CSRF to RCE and WordPress-site takeover: CVE-2020-8417 - WPSec
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Jatin Dhankhar 4. velj
I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
NCC Group APAC 14 h
new Blog Post: "Properly Signed Certificates on CPE Devices" by Balazs Bucsay
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Peleg Hadar 4. velj
CVE-2019-19705 - A vulnerability which I found in Realtek's Driver package for Windows, which affects a lot of PC users:
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Ptrace Security GmbH 15 h
Analysis of Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2016–3088)
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Florian Hansemann 4. velj
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
FortiGuard Labs 4. velj
We recently captured two different variants. After publishing our initial analysis, our most recent blog details how it infects the machines of its victims, including how it collects data and communicates with its C&C server:.
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
/r/netsec 4. velj
New Backdoors in HiSilicon-Based DVR and IP Cameras
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Ruben Santamarta 4. velj
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
zseano💫 4. velj
Just a quick blog post: Easily leaking passenger information on a program. Be careful what you share online! :)
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
Kacper Szurek 4. velj
[EN] Do you work with a lot of Linux servers? Do you log in to each of them using your ssh key? Check Netflix BLESS.
Reply Retweet Označi sa "sviđa mi se"
David Valles proslijedio/la je tweet
/r/netsec 4. velj
Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Read From The File System
Reply Retweet Označi sa "sviđa mi se"