 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Index filtré de tous les Tweets pour le terme protocol |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Index filtré des Tweets pour le terme protocol (139 résultats)S'abonner au fil RSS Twitter pour le terme protocol[2012-10-06] - 12:46:40 - "hdmoore" - @D4rk0TheBoss non-standard protocols and IPSEC are tough to get through a corprorate firewall, is there a benefit vs SSL?[2012-10-05] - 08:29:10 - "rybolov" - REN-ISAC: the future holds protocol buffers ala Google. Perl and XML performance is horrible for large/fast data sharing. #ITSAC[2012-10-05] - 07:14:15 - "lostinsecurity" - Q: Does Google Public DNS support the DNSSEC protocol? A: we accept and forward DNSSEC-formatted messages; we do not yet validate responses[2012-10-04] - 20:41:27 - "innismir" - That's new -- Oct 4 07:05:29 server sshd[12345]: Bad protocol version identification 'XXXXXXXXXXXXXXXXXX' from 78.7.72.150[2012-10-02] - 19:30:52 - "stevewerby" - @0xcharlie described an NFC protocol attack vector of replacing tags. Even harder to detect than rogue QR codes I've been testing. #sectorca[2012-09-21] - 16:40:44 - "jeffh" - Mobile app I am playing with isn't using http as its com protocol. Burp sees it redirect to localhost on random port each time. Then nota.[2012-09-20] - 19:33:21 - "freaklabs" - @roteno sounds like OTG. handshake occurs to determine the master (A-dev). Then it follows std USB protocol.[2012-09-14] - 00:47:19 - "sambowne" - RT @MetricsHulk: #UNITEDSummit SHODAN was originally 90% HTTP/S. It has rapidly grown it's database to other protocols.[2012-09-13] - 18:30:28 - " dloss" - To handle TCP based application layer protocols in Scapy, use StreamSocket(). http://t.co/fhyXdkRk[2012-09-13] - 03:31:30 - "TenableSecurity" - PVS plugin 7043 enumerates observed IP protocols (http://t.co/LJ4WYxpi) much like Nessus 14778 does http://t.co/FMNFEhP8)[2012-09-09] - 04:29:05 - "SecurityTube" - [Video] Cellular protocol stacks for Internet - GPRS, EDGE, UMTS, HSPA demystified http://t.co/daGeI9hs[2012-09-06] - 16:14:00 - "jeffh" - Mobile app I am playing with isn't using http as its com protocol. Burp sees it redirect to localhost on random port each time. Then nota.[2012-09-06] - 11:45:10 - "_ikki" - RT @headhntr: Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks [PDF] | Usenix - https://t.co/JimcJi3c[2012-09-06] - 02:36:20 - "hack_lu" - RT @adulau: http://t.co/aD4F5kT2 Interested in Fuzzing the GSM protocol stack - this talk will be at hack.lu 2012 @hack_lu #gsm #in ...[2012-08-14] - 07:38:18 - " antic0de" - RT @headhntr: Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks [PDF] | Usenix - https://t.co/JimcJi3c[2012-08-14] - 05:49:23 - " julianor" - RT @headhntr: Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks [PDF] | Usenix - https://t.co/JimcJi3c[2012-08-12] - 23:49:31 - "JoelEsler" - The TCP fast open protocol extension coming to a Linux kernel near you. http://t.co/hq7U5y1l[2012-08-05] - 14:57:17 - "ericfreyss" - @btreguier wireshark seul et non configuré pour interception sert avant tout à auditer des protocoles[2012-07-26] - 23:41:37 - "adulau" - Don't read this paper http://t.co/pitgVdfp you'll be scared by the mix RFID-Biometric System and the protocol design.[2012-07-26] - 16:46:47 - "ivanristic" - RT @qualys: @ivanristic today at #BlackHat at 11:45 to discuss protocol-level evasion of Web Application Firewalls http://t.co/bYWYLlAf[2012-07-26] - 15:20:48 - "qualys" - @ivanristic today at #BlackHat at 11:45 to discuss protocol-level evasion of Web Application Firewalls https://t.co/PqwymKyA[2012-07-26] - 07:01:45 - "InfosecEvents" - Current ipv6 - stateless firewalls won't work on fragmented packets. The protocol design has port data in 2nd packet. #blackhat[2012-07-17] - 16:39:20 - " robtlee" - RT @lennyzeltser: A webcast by @mikecloppert on protocol reverse engineering for incident response, live on July 17: http://t.co/mQKQ7rA ...[2012-07-17] - 11:38:51 - " ChristiaanBeek" - RT @lennyzeltser: A webcast by @mikecloppert on protocol reverse engineering for incident response, live on July 17: http://t.co/mQKQ7rA ...[2012-07-17] - 08:16:35 - " sansforensics" - RT @lennyzeltser: A webcast by @mikecloppert on protocol reverse engineering for incident response, live on July 17: http://t.co/mQKQ7rA ...[2012-07-16] - 22:32:03 - "FlUxIuS" - RT @Netzob: Reverse engineering of Epson printer protocol http://t.co/i7EZ7l7g (fr)[2012-07-16] - 10:39:27 - "jclausing" - RT @lennyzeltser: A webcast by @mikecloppert on protocol reverse engineering for incident response, live on July 17: http://t.co/mQKQ7rA ...[2012-07-13] - 02:11:41 - " lennyzeltser" - A webcast by @mikecloppert on protocol reverse engineering for incident response, live on July 17: http://t.co/mQKQ7rAj #DFIR[2012-07-04] - 10:27:17 - "stalkr_" - Big update to libmich https://t.co/BZ3DRuU1 python library for network protocols and various formats[2012-07-02] - 00:03:00 - "johl" - ErlPort: Erlang port protocol for Python http://t.co/F0ZqTeSP[2012-06-27] - 02:12:11 - "erocarrera" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 21:44:36 - "2gg" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 20:01:20 - "_argp" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 11:55:40 - "druidian" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 03:32:42 - " stalkr_" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 01:23:13 - "matalaz" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-26] - 01:19:11 - " Ivanlef0u" - RT @aaronportnoy: Looks like someone reverse engineered the #CrowdRE protocol and released a private server cleverly named Cloud Nein: h ...[2012-06-24] - 01:54:40 - " EvilFingers" - Wireshark 1.8.0: Wireshark is the world?s most popular network protocol analyzer. It is used to, troubleshooti... http://t.co/VDoXiYDk[2012-06-22] - 18:38:52 - "pentestit" - Wireshark 1.8.0 with a huge list of updates and protocol support now available - http://t.co/7FV5TQ3h via @pentestit[2012-06-22] - 09:08:29 - "packetlife" - .@tonhe I need to forward protocols other than DHCP[2012-06-21] - 22:07:08 - "lbhuston" - RT @slandail: RT @ Today, give your egress points a quick audit. Take a look for unexpected protocols, VPN connections de ...[2012-06-20] - 01:24:06 - "ChristiaanBeek" - RT @reversemode: Because PLC protocols are simple, buffer overflows generally are harmless. http://t.co/VVyqQTeC[2012-06-19] - 00:34:41 - " lbhuston" - Today, give your egress points a quick audit. Take a look for unexpected protocols, VPN connections destinations. #security[2012-06-19] - 00:00:38 - " slandail" - RT @lbhuston: Today, give your egress points a quick audit. Take a look for unexpected protocols, VPN connections destinations. #security[2012-06-04] - 12:04:49 - "MalwareScene" - .: Traffic Anomaly Detection - TCP DNS :. http://t.co/ryYu13YK #networks #protocols #security #worms #malware #botnets #threats #attacks[2012-05-31] - 15:26:09 - "sans_isc" - [Diary] Speeding up the Web and your IDS / Firewall, (Tue, May 29th): HTTP as a protocol has done prett... http://t.co/4jvwTeeK #sansisc[2012-05-28] - 16:41:10 - "innismir" - Seeing a shitton of these since today across a bunch of my greasetraps: sshd[XXXX]: Bad protocol version identification 'hello'[2012-05-26] - 05:08:07 - "opexxx" - Miranda IM Portable 0.9.49 (multi-protocol instant messaging) Released http://t.co/gzXvOvDj[2012-05-16] - 03:32:56 - " _coreDump" - RT @angelofsecurity: New tool: belch - it's a protocol pen testing tool for AMF and Java-serialization apps. Made by @_coreDump https: ...[2012-05-16] - 00:18:14 - "ioerror" - @dakami @redtwitdown SSH is a lot of eggs in one basket. I sorta also like the protocol classification problems of a new protocol.[2012-05-15] - 17:56:12 - "jack_daniel" - @MikeTalonNYC FWIW, I always have at least two OpenVPN endoints on diff ports and protocols, plus IPsec listeners, but that's me.[2012-05-08] - 01:32:46 - "dougburks" - RT @remor: Calculating MD5/SHA1/SHA256 simultaneously for all file transfers on several protocols in network traffic is kind of cool.
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|