 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "hdmoore" (1615 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter hdmoore[2012-10-10] - 05:01:19 - @DanRaywood @ABridgwater @leonward by who is the real question; hosting providers as far back as 1993/1994 with BSD, 1998+ Linux[2012-10-10] - 05:01:19 - @info_dox @metasploit @rapid7 thanks, it should be passing a --config-dir parameter pointing to our cached SSL pubkey[2012-10-06] - 12:46:40 - @0xcharlie meterpreter negotiates SSL once the TCP side is staged, but you can also use reverse_https to get end-to-end SSL[2012-10-06] - 12:46:40 - @D4rk0TheBoss most of metasploit is still aimed at initial connectivty vs persistent access, SET has some tools for this though[2012-10-06] - 12:46:40 - @D4rk0TheBoss definitely, but they dont help until the payload is staged, is there a reason to use AES vs SSL?[2012-10-06] - 12:46:40 - @D4rk0TheBoss non-standard protocols and IPSEC are tough to get through a corprorate firewall, is there a benefit vs SSL?[2012-10-06] - 12:46:40 - @Mephux neat! just saw it, wooo ruby :)[2012-10-06] - 12:46:40 - Woohoo! A new Burp Suite release (v1.5rc2): http://t.co/ND3xF5QI[2012-10-06] - 12:46:40 - RT @kerouanton: @hdmoore so it's time to write an article on a new BurpSuite plugin for Hakin9 ;) @endrazine Posted: http://t.co/glHxnz7Q[2012-10-05] - 07:37:35 - @Balgan actual scans are nmap + udpblast, processing is ruby+elastic+mongo[2012-10-05] - 07:37:35 - RT @mubix: {blog} Meet ?q?? Free Metasploit Exploit Pack http://t.co/dspuspKh No backlash, great to see them find a home[2012-10-03] - 02:02:09 - The Kaspersky article on Brazil DSL calls this CSRF, but this is actually a password reset/default flaw: http://t.co/baqRITT4[2012-10-03] - 02:02:09 - @Souley the weird thing is the CSRF exploit screenshot; it's not actually related to the shell script exploit ( no pass vs default pas)[2012-10-03] - 02:02:09 - @kaito834 CSRF is a victim-driven action and has no bearing on the default password exploit used[2012-10-01] - 04:56:43 - @markofu I also do a lot of mongoexport to JSON and Hadoop-style CLI procesing with Ruby + GNU Parallel, easy with 200Gb of RAM[2012-09-29] - 12:33:41 - @myanis007 there isnt a public network, but you can use Metasploitable2 and other VMs to get up to speed[2012-09-29] - 12:33:41 - @chort0 @andrewsmhay counterpoint; disable ssh password authentication (pubkey only), dont allow php applications, change the ssh port[2012-09-29] - 12:33:41 - RT @_juan_vazquez_: Just added #Metasploit mod Samba SetInformationPolicy AuditEventsInfo Heap Overflow (CVE-2012-1182) Screenshot: http ...[2012-09-22] - 05:32:39 - RT @egyp7: Overview of how Metasploit payloads work: https://t.co/sanKQOul[2012-09-22] - 05:32:39 - @secmoose I would tell you a joke about ruby, but you would only ask which one?[2012-09-21] - 05:35:28 - Microsoft Fix-IT for IE 0-day, but verify with #metasploit first (the fix may not work): http://t.co/tgKhoInp https://t.co/MGybNcqC[2012-09-21] - 05:35:28 - @prakharprasad Metasploit provides source code, you provide OBFUSCATE. Seriously though, we do in many cases, but no approach is universal[2012-09-21] - 05:35:28 - @jstevensen @netbiosX ~8000+ Ubuntu machines still havent applied the patch and have MySQL open to the world[2012-09-21] - 05:35:28 - @netbiosX @jstevensen looked at scan results from the last 30 days, grepped ubuntu, mapped patches/packages to banners, crunched[2012-09-21] - 05:35:28 - @erickolb @jodieswafford OS dependencies are tricky, IE8/IE9 on Windows 7 requires Java 6 for the ROP chain[2012-09-19] - 05:39:29 - RT @kaithomsen: Oh, and that new IE 0-day Metasploit module works even better than the Java 0-day from two weeks ago. Might replace SCCM ...[2012-09-19] - 05:39:29 - @ZeroDayLab: Nvidia puts Tesla K20 GPU coprocessor through its paces: http://t.co/GMmpNNH5 Dynamic Parallelism + Salted Hashes?[2012-09-18] - 07:05:24 - RT @_sinn3r: Just added #Metasploit IE 0day (IE7/8/9): http://t.co/1bI4fmNP Thx @_juan_vazquez_, @binjo, @eromang[2012-09-14] - 20:55:02 - @SpartanTango by authenticating to them using the pubkey module in metasploit ( w/o the public key )[2012-09-14] - 20:55:02 - @SpartanTango the f5 web fingerprint was done by matching the 443 login (f5 networks configuration....), then ssh tested[2012-09-14] - 20:55:02 - @SpartanTango not true; older versions shipped with ssh on by default, confirmed by F5[2012-09-14] - 20:55:02 - @SpartanTango true, but 6500 appliances have ssh exposed regardless, if that goes against guidance, the guidance needs to be more explicit[2012-09-14] - 20:55:02 - @yeleekneb ~750 of 13,500 total ( half of which have ssh open )[2012-09-14] - 09:11:18 - @darkuncle @peakscale ssh is only on by default in older versions at least[2012-09-13] - 11:06:48 - Random: 50% of F5 BigIPs have SSH open and 10% of those still allow root logins with the widely published SSH private key #unitedsummit[2012-09-12] - 20:16:28 - RT @egyp7: Blog post about current_user_psexec Metasploit module I demo'd at #defcon - https://t.co/bBwYQ66w[2012-09-12] - 06:22:17 - @spxza @hugoestuamigo ethics may be lose worrysome than law; most bruteforce sources are also owned boxes[2012-09-12] - 06:22:17 - @postmodern_mod3 @Mephux someday Apple will ship a ruby interpreter that works..and open source their hardware, probably the same day :)[2012-09-12] - 06:22:17 - @Carlos_Perez @Mephux @postmodern_mod3 Linux distros screw up Ruby too, but only Apple reversed endian order and linked libeditline vs rl[2012-09-10] - 16:22:00 - @7h3linguist still waiting to here back from engineering, ill poke them with a stick again[2012-09-10] - 16:22:00 - @D4rk0TheBoss thanks! its fed by the metasploit blog content at the moment[2012-09-09] - 00:06:26 - RT @threatagent: My son (@ipwnstuff) wrote a Metasploit extract OSX pw from Keychhains @BLacKR1D3R @DaveMarcus http://t.co/AjYWttmm[2012-09-08] - 03:25:00 - @7h3linguist still waiting to here back from engineering, ill poke them with a stick again[2012-09-07] - 05:51:39 - @davidkl_ saw that - and username is phone number, pretty terrible. BlackBerries used to/still send their phone number in DHCP requests[2012-09-07] - 05:51:39 - @vmamuaya you likely have the wrong target selected (java vs win32 native). Java targets need Java payloads[2012-09-06] - 06:30:18 - RT @mubix: {blog} Completely In-memory Mimikatz with Metasploit http://t.co/OiBwyi4C[2012-08-11] - 21:25:22 - fun with non-alphanumeric javascript: http://t.co/t35FeNxA[2012-08-09] - 19:59:25 - @cBekrar An ironic statement considering VUPEN's customers :) Metasploit is open source and available to governments rebels alike[2012-08-07] - 23:33:37 - @cryptoOCDrob best bet is an attack proxy or browser plugin (Paros, Burp, Tamper Data, etc)[2012-08-07] - 23:33:37 - @zohraan_amin metasploit runs on windows, linux, bsd, android, and iOS (and able to a exploit a wide variety of platform types)[2012-08-03] - 21:43:10 - A neat local privilege escalation for Linux systems using the nVidia driver: http://t.co/8CMZq3Gd[2012-07-31] - 14:29:53 - So long, Las Vegas - great to see everyone at BSidesLV, BlackHat, and Defcon this year. Talk slides should be online later this week
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|