 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour EdiStrosar |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " EdiStrosar" (845 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter EdiStrosar[2012-10-09] - 13:02:32 - RT @hugofortier: Linux on a peetop http://t.co/3mIEP1Pf[2012-10-09] - 03:28:15 - @NTarakanov You don't look very upset. Maybe because you have more 0-days in the pocket :-)[2012-10-09] - 03:28:15 - RT @NTarakanov: Just checked, 0day in Flash which I prepared for #pwnium2 has been killed. Thank You very much @j00ru @fjserna You are r ...[2012-10-07] - 23:43:58 - RT @0x57: De-anonymizing http servers in onionland to an ip address using clock skew, Python code by @ampernand http://t.co/aWHpplwA[2012-10-06] - 17:31:48 - RT @hackerfantastic: Releasing portable 64bit OS-X kernel rootkit that uses no hardcoded address for Lion below. http://t.co/pFezR ...[2012-10-04] - 01:28:55 - SMAP support added to kernel 3.7: http://t.co/IhiRS0zg | What is SMAP: http://t.co/MGx1DgsZ[2012-09-29] - 08:15:46 - RT @nmap: Hakin9 Magazine's Nmap issue successfully trolled by security researchers! http://t.co/WHhYVfk6[2012-09-28] - 22:45:32 - RT @hdmoore phpMyAdmin backdoored via SourceForge mirror: http://t.co/MY4NVmpr Exploit added to Metasploit: https://t.co/8w1nU74O[2012-09-28] - 22:45:32 - Another critical Java issue reported: http://t.co/AHBgzQFt Mitigation: leave Java alone and remove IE/FF/Chrome/Safari/Opera instead.[2012-09-28] - 22:45:32 - RT @bluegene_: Linux TCP/IP tuning for scalability http://t.co/PwJ0yrYe[2012-09-22] - 16:46:30 - Dear German government, you may switch back to IE now.The patch for 0-day was released.[2012-09-20] - 17:09:20 - MSFT will release OOB patch for IE 0-day: http://t.co/bHZmZhRV[2012-09-20] - 17:09:20 - RT @jness: More info about the Fix It for current IE 0day, how it works: http://t.co/lUJfM9Qu Also, has anyone seen exploit that doesn' ...[2012-09-18] - 19:05:59 - @MihaPecnik Disabling JS may help. And EMET3.5 will catch Metasploit ROP code. Yes, switching to Links is also an option ;-)[2012-09-18] - 19:05:59 - @MihaPecnik That's because EMET3 will catch heap spray and Metasploit uses ROP gadgets from older Java versions.[2012-09-18] - 19:05:59 - MSFT released SA2757760 for IE 0-day: http://t.co/35jsZVLx. Mitigation: install EMET (and pray @wtfuzz is not around: https://t.co/EGjVtM0c)[2012-09-17] - 21:19:27 - Precise as a Swiss quartz... @_sinn3r and @_juan_vazquez_ are working on new IE 0-day, and looks good so far: http://t.co/Vj99OsOm[2012-09-17] - 21:19:27 - Why would somebody put two 0-days in the publicly accessible, and indexed, web server?[2012-09-17] - 21:19:27 - RT @binjo http://t.co/X0SKJofo IE 0-day analysis from @instruder of @vulnhunt[2012-09-17] - 21:19:27 - RT @_sinn3r: Just added #Metasploit IE 0day (IE7/8/9): http://t.co/1bI4fmNP Thx @_juan_vazquez_, @binjo, @eromang[2012-09-17] - 21:19:27 - RT @WTFuzz Wrote a PoC for 0-day found by @eromang for IE9 that works on clean Win7 systems, no Java ROP required and EMET doesn't catch it.[2012-09-17] - 05:09:58 - Looks like IE8 0-day was found ITW. I bet @_sinn3r is already working on Metasploit module :)[2012-09-17] - 05:09:58 - RT @eromang: New blog post: Zero-Day Season Is Really Not Over Yet http://t.co/U3Bakc0g #zataz #infosec[2012-09-16] - 17:56:52 - RT @j00ru Fun facts: Windows kernel and Device Extension Size -- theoretically valid parameter BSOD the machine due to arithmetic error.[2012-09-15] - 22:29:19 - Unicode RLO char is becoming important social engineering vector: http://t.co/wfRjFbxx[2012-09-14] - 15:42:40 - Getting tricky with shellcode: http://t.co/6GdJcqqw (via @fireeye)[2012-09-11] - 01:24:29 - RT @xjamesmorris: Linux Security Summit 2012 slides are published - http://t.co/sAjNZLNx[2012-09-06] - 19:07:22 - @MihaMarkic Try running Java CP applet from elevated console: http://t.co/Y4q3YedG Else disable Java system-wide: http://t.co/w9s9AiGW[2012-09-06] - 19:07:22 - @MihaMarkic Glad it worked. So, you're occasional Java user? Nice, just don't forget to check http://t.co/tVsiEqnq from time to time :D[2012-09-06] - 19:07:22 - Downgrading to Java/JRE 6 update 34 may not the best option. Downgrade to JRE 6 update 30 for optimal security.[2012-09-06] - 19:07:22 - @ParvezGHH Indeed, BinScope confirms dll is DYNAMICBASE compatible. Checked hxds.dll version 2.7.61224.0.[2012-09-06] - 19:07:22 - RT @sagar38: And there it goes my analysis of this latest Java 0day (CVE-2012-4681) http://t.co/cIWqzw4X[2012-09-06] - 19:07:22 - Three days since Java 0d is all over the news but still no official response from Oracle. And they call security researchers irresponsible.[2012-09-06] - 19:07:22 - Oracle released OOB update for recent Java 0-day: http://t.co/OxYYJXMP | Download Java 7u7: http://t.co/R9ZkxjJE[2012-09-06] - 19:07:22 - RT @daveaitel: Java patches 4 bugs total - details here : http://t.co/yUWhSuLJ[2012-09-06] - 19:07:22 - RT @corelanc0d3r: mona rop now produces ruby, python javascript chains (also in -rva mode), run !mona up to get the latest #immuni ...[2012-09-06] - 19:07:22 - RT @legerov: vulndisco java 0day still works against the latest version[2012-09-06] - 19:07:22 - RT @_clem1: Nice GCC plugin to add runtime integer overflow checks http://t.co/rGHw1pIX[2012-08-14] - 14:12:37 - RT @backtracklinux: BackTrack 5 R3 Released! Torrent downloads only for now : http://t.co/mpUcWzUk Download page to be updated soon.[2012-08-13] - 12:38:20 - RT @s7ephen: BlackHat 2012: A Blogpost, A PhotoJournal, and slides from our talk and training http://t.co/TikB9T0X[2012-08-10] - 08:52:40 - RT @deroko_: This kernelbase.dll and EMET stuff reminds me of one old tweet : https://t.co/zW1dCBah[2012-08-08] - 08:02:39 - RT @nudehaberdasher: Who wants Windows 8 Heap Internals paper/slides? Easy 90 pages to relax and read ;). https://t.co/vgWBPZRt[2012-08-07] - 10:53:48 - Privilege escalation via Nvidia drivers for Linux: http://t.co/JYAvKzoO | http://t.co/FWvOxaIv (Pic source: @heisec)[2012-08-07] - 10:53:48 - XSS in uTorrent remote session appeared nothing groundbreaking: http://t.co/0ezZiBTh Then @taviso spotted it: https://t.co/AicbXyVZ[2012-08-07] - 10:53:48 - RT @ExodusIntel: Our 1st intel feed deliverable is a 0day w/ a reliable remote exploit w/ CoE against Win2k8 (in spite of ASLR, DEP, Saf ...[2012-07-26] - 23:55:10 - @mubix BlackHat and DEFCON are irrelevant. Congrats![2012-07-26] - 23:55:10 - RT @purehate_: Blackhat is just to full of people with the rockstar mentality. They think they are so smart but they are killing infosec.[2012-07-24] - 16:23:35 - RT @darkoperator Back to Gnome Classic on Ubuntu 12.04 LTS: http://t.co/VF82I69i[2012-07-24] - 16:23:35 - A heap of overflows? - http://t.co/X4AsXQ7F (via @sans_isc)[2012-07-24] - 16:23:35 - 0xB16B00B5 string was there since kernel 2.6.32 (12/2009): http://lxr.linux.no/#linux+v2.6.32/drivers/staging/hv/Hv.h#L50.[2012-07-24] - 16:23:35 - There are plenty of fuck and shit words in kernel v3.4.6 and still someone feels offended for something like 0xB16B00B5?[2012-07-24] - 16:23:35 - Just in case you want to switch from CentOS to the most compelling Linux offering out there: http://t.co/l0QHoMSe
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|