|
Les Tweets pour attackresearch |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " attackresearch" (72 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter attackresearch[2012-09-30] - 20:19:40 - Back up. New DNS propagating. Cya GoDaddy.[2012-07-26] - 06:33:08 - colin and gideon about to drop a windows 7 post exploitation 0day in our Tactical Exploitation class[2012-06-22] - 11:06:52 - @mjg5772 not with the right payload there's not[2012-06-16] - 02:51:58 - first time I mentioned the idea of a public, collab RE system was at defcon in 2005. I only ever got around to building a shared blog tho.[2012-05-04] - 09:20:49 - @panadero class description says general understanding of scripting languages such as Perl, Python, and Ruby. So if you have that u r good[2012-02-23] - 11:48:35 - RT @jcran: RT @hdmoore: Metasploit 4.2 Released: IPv6, VMware, and Tons of Modules! http://t.co/ww1wiMGx[2012-02-17] - 05:56:46 - It appears that csoghoian knows basically nothing about the 0day market. Of course any 1 who does probably won't give interviews...[2011-12-30] - 08:00:51 - When blackhats drop 10 year old stuff, there is a message there...[2011-12-28] - 09:32:18 - Telnet is often still in use, especially in non pc backend environments. I see it setup with ssl as well.[2011-11-26] - 05:01:07 - @RobertTres get virtualbox, install some os'es, get metasploit, read some books, start building a toolkit, learn every tool in backtrack[2011-11-26] - 05:01:07 - @RobertTres also, learn to code. C, ruby, perl, whatever u can. So much to learn[2011-08-11] - 02:59:24 - Holy crap Ian Iztik's talk on voip botnetss and exfil is mind blowing[2011-08-06] - 04:06:45 - #bsideslv was so awesome I never even made it to bh briefings or defcon. Bsides ftw[2011-08-04] - 03:03:21 - Holy crap Ian Iztik's talk on voip botnetss and exfil is mind blowing[2011-08-02] - 02:17:42 - RT @teamcymru: Run SAP? Polyakov on 8/4 at BlackHat=how to comp 50% of SAP systems w/new vuln, works even w/2 factor auth http://bit.ly/ ...[2011-07-31] - 17:32:00 - RT @0xtosh: ?@frbbs: http://t.co/7BBlerG - I paid 50k USD for a penetration test and all I got was a Nessus scan by a CISSP? Welcome to ...[2011-07-26] - 04:55:59 - If you don't know blackhats, you dont know APT. (and by blackhats I don't mean botherders, I mean ~el8, h0no, zf0, etc.)[2011-07-05] - 19:09:04 - @WeldPond blackhats first, criminals second, hactivists last (researchers are in the loop somewhere as well)[2011-06-29] - 23:51:10 - RT @Lares_: RT @carnal0wnage: http://t.co/x6QfbPG pentester/customer must read. I disagree with a couple of things but its very worth a read[2011-06-22] - 22:50:17 - RT @jcran: What would a pentesting dream team look like?[2011-06-21] - 19:53:01 - @knickz0r failed password for invalid user www from 78.153.208.101 port 48348 ssh2[2011-05-19] - 22:04:33 - As msf / r7's tech gets so good, less and less need for traditional pentesters. Automation and convergence.[2011-05-19] - 02:45:29 - anyone aware of a global scan database, kinda like shodan but with fresher more complete data ? I need to do some data mining . . .[2011-04-22] - 17:25:26 - Stephan Chenette's fireshark research is very cool #sourceboston[2011-04-20] - 04:26:29 - Its time whitehats stop just getting owned by blackhats and get educated by them as well...[2011-04-17] - 04:39:21 - @TanTianrong @not_me yeh man, sure, givin away 0day is never good.[2011-04-16] - 14:31:13 - @not_me: also, dear china, stop phishing me, youre just giving away youre 0day which begets more chinese looking attacks.. THIS![2011-04-14] - 04:13:32 - did I use source IP hopping, slow post HTTP SMTP VRFY bomb techniq at nccdc? Yes I did. Firewalls bowed.[2011-04-11] - 10:16:02 - @alexlevinson @indi303 yeh its true we are bowing to your firewall, because we are on the floor laughing[2011-04-11] - 10:16:02 - Cyber security athletes have the best firewalls #nccdc[2011-04-03] - 05:23:05 - @dinodaizovi clues like the mysterious letter aka crappy malattachment Or strange cipher aka why camelia instead of ssl[2011-04-03] - 05:23:05 - @dinodaizovi and for suspects: the skinny .cn guy, the hoodied US blackhat, the wiley russian and the fat old butler no one suspected...[2011-03-30] - 08:45:55 - Its not that more things are getting hacked lately, its that the blackhats are allowing you to know about more of them...[2011-02-08] - 03:17:58 - I seem to remember an interesting talk a while back called Why Blackhats Always Win . . . .[2011-01-16] - 06:15:19 - RT @cactiix: Over weight charge (check) Morning Massage (check) Little to no sleep (check) Blackhat DC here we come #teamAR[2011-01-07] - 23:06:00 - Why can't shmoocon every be immediately after BHDC :( Its too hard to fly back and forth in that time frame.[2010-12-31] - 02:31:08 - @threatpost RE New Mass Injection Attack via Java Download http://ow.ly/3wif5, sounds a lot like what we talked about in Metaphish[2010-12-16] - 11:50:12 - does anyone actually believe that blackhats (not carders, phishers, or bothearders) couldn't pull off something like stuxnet if they wanted?[2010-12-16] - 11:50:12 - @pusscat maybe thats the diff, blackhats will regardless of pay. Their currency is access, source, info, tools.[2010-12-15] - 02:51:24 - Val Smith and Colin Ames will be teaching an updated version of Tactical Exploitation Training at Blackhat DC Jan 16-17 See www.blackhat.com[2010-12-03] - 02:03:42 - No matter how much SDL, AV, IDS, Firewall and patch management you have, I still get in.[2010-11-20] - 07:00:45 - love my friends, but I'm very sad about where the pentest industry is None of it is what attackers actually do as I've been saying for years[2010-11-13] - 01:17:40 - You can't keep a real attacker out, no matter how many firewalls, IDS and antivirus you have[2010-10-14] - 14:50:45 - few years ago edskoudis put a thought into my head re whats wrong with pentests. Multiple presosconvos later its starting to spread. tnx Ed[2010-09-30] - 22:57:36 - This just in, according to our reverse engineering, Stuxnet actually designed to assassinate Greg Giraldo and steal your girlfriend![2010-09-17] - 00:18:09 - RT @hdmoore: RT @egyp7 There are still slots available for my Metasploit training at #sectorca. http://bit.ly/brwT7c[2010-07-17] - 07:28:34 - AR team arrived home safe and sound. Nodding off now, time to start on SANS / BH / Defcon talks already![2010-07-15] - 12:38:09 - Freaking out over meterpreter on osx![2010-07-11] - 04:16:58 - Colin just blew me away with some PDF RE fu[2010-05-18] - 20:10:57 - HD Moore Val are teaching a class on Tactical Exploitation at Blackhat July 27-28th[2010-05-07] - 14:08:43 - Val Smith, Anthony Lai, and Colin Ames to speak at Blackhat and Defcon on China[2010-04-17] - 05:46:10 - Val Smith Chris, speaking tomorrow, Oct, 23 at Toorcon in San Diego on Why Blackhats Always Win
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|