|
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "lvdeijk" (468 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter lvdeijk[2012-06-24] - 17:50:28 - @catalyst256 Metasploit-The-Penetration-Testers-Guide - good investment[2012-06-24] - 17:50:28 - RT @meeas: That is why we skipped SamuraiWTF 1.0 and jumped to SamuraiWTF 2.0. Its a major upgrade. Get ready to download 2.0-RC1 Monda ...[2012-06-22] - 21:55:12 - Wireshark 1.8.0 released http://t.co/tGipKBe3 W00t![2012-06-22] - 21:55:12 - RT @virusbtn: Dutch political party says users should be able to participate in DDoS attacks, as long as it's announced in advance http: ...[2012-06-22] - 06:51:44 - Having way to much fun with the metasploitable VM :)[2012-06-22] - 06:51:44 - RT @barryirwin: Looking for folk willing to contribute some pcap samples of DNS traffic in order to do some real-world testing of our BO ...[2012-06-20] - 03:05:29 - @0xAli wow, that sure is a big difference.....pop a question in the google kippo user group ?[2012-06-20] - 03:05:29 - Good discussion on the google kippo usergroup. If you use kippo, join in ![2012-06-16] - 16:01:40 - Countering the removable device threat with USB honeypots - Sebastian Poeplau http://t.co/DNfthOAl via @youtube[2012-06-15] - 06:22:21 - Ghost USB honeypot released http://t.co/xkxfUQHw - awesome news ![2012-06-10] - 10:05:58 - @0xAli why not a ssh tunnel ??[2012-06-06] - 22:13:49 - @0xAli What does nmap say ? Be sure to have a open tcp/445 and 139[2012-06-05] - 12:43:51 - Decoding Common XOR Obfuscation in Malicious Code http://t.co/pZsn69aS[2012-06-01] - 04:20:15 - Got my ssh mastery copy today :) http://t.co/1f6uKCwg[2012-05-31] - 10:59:31 - @jaysonstreet sure was one mean looking cloud you filmed and put on twitvid :-/[2012-05-29] - 16:01:21 - @pacohope I run some malware caching honeypots. I can confirm the findings[2012-05-29] - 16:01:21 - @explanoit Sure, use http://t.co/U5EImzA2 the dionaea honeypot[2012-05-29] - 16:01:21 - @explanoit Consider http://t.co/1I9SraWY for a ssh HP as well :) I combined the two[2012-05-29] - 16:01:21 - /usr/sbin/useradd -d /dev/shm/ / -o -u 0 bash --actual command used on my kippo box. Anyone seen similar ?[2012-05-29] - 16:01:21 - @0xAli As to be expected, kippo accepts it and return no error. First time I've seen this type of trickery[2012-05-25] - 04:25:29 - RT @egyp7: need a gem in your Metasploit install that we don't ship? /opt/metasploit*/diagnostic_shell, then gem install [2012-05-25] - 04:25:29 - ?@0xAli: @lvdeijk You will like this https://t.co/inoo0KBj (using windows as a honeypot) :D? - this is f-ing awesome ![2012-05-24] - 14:14:21 - RT @ProfWoodward: As CAPTCHAS become ever more illegible or just silly, enjoy some of the best at http://t.co/J0HOEllB[2012-05-23] - 09:48:54 - New nmap is released http://t.co/JjOIbm62[2012-05-22] - 06:57:06 - RT @ProjectHoneynet: Interesting post from @SpiderLabs here on botnet web attack scripts http://t.co/TT2v78Ml[2012-05-22] - 06:57:06 - @BrianHonan let me know when you need someone to talk about honeypot systems :D[2012-05-18] - 21:53:09 - @0xAli @threatagent hmmm, I think it it to vague in its description. There are a lot of different types of honeypots out there.[2012-05-18] - 21:53:09 - RT @0xAli: RT @threatagent: Wow! Microsoft awarded patent for Honeypot http://t.co/dmHifxLh - DAFUQ! (cc @lvdeijk)[2012-05-18] - 21:53:09 - @0xAli @threatagent well, Microsoft OSses are used as high interaction honeypots anyway :D[2012-05-16] - 14:18:31 - 60 established but dormant connection from Indonesia on my kippo. WTF ?[2012-05-14] - 17:13:02 - SSH Mastery Released http://t.co/UyY4wxn0[2012-05-10] - 23:48:30 - @ikoniaris just curious, when are you going to release the multi lingual version from kippo-graph ?[2012-05-04] - 21:47:46 - @biosshadow logged into your kippo Again did you ? :D[2012-05-04] - 21:47:46 - @diami03 cloud in a biblical setting ?[2012-05-02] - 22:32:50 - 323689 failed login attempts and 4770 where successful when the root ssh password is 123456. What kind of dictionary are they using ?[2012-05-02] - 08:06:23 - RT @xxradar: BRUCON 2012 !!This year we have 8 great trainings: http://t.co/4MPhaoxfWe also have fantastic ideas, budget and adminis ...[2012-05-02] - 08:06:23 - RT @ProjectHoneynet: We've just released V3 of Glastopf AKA Glaspot ..check it out here: https://t.co/o9cTmQzF #honeynet #web #honeypot[2012-05-01] - 02:47:48 - RT @JoelEsler: Hey OSX users. Update your freaking Java.[2012-04-29] - 03:02:40 - After the talk from @f1nux I keep thinking about a UPnP honeypot @ProjectHoneynet any thoughts ?[2012-04-28] - 09:18:19 - RT @lennyzeltser: Cheat sheet for memory forensics using Volatility by @chadtilbury: http://t.co/nNnGjOrc #DFIR #malware[2012-04-28] - 09:18:19 - Today's recap. Honeypot reacts to attacks (by design of course) IDS goes bezerk. Managers scream. Awkward times. My work is done[2012-04-27] - 16:00:50 - @hvcco @finuxtechweekly Hahahaha, yeah that was epic. That UPnP talk blew me away ![2012-04-27] - 16:00:50 - The OpenIDS project http://t.co/FPz6eTLS[2012-04-26] - 07:44:06 - Awesome upnp talk by @f1nux #BSidesLondon[2012-04-24] - 07:57:54 - ?@stevewerby: Cloud has jumped the shark - I just received an email with a subject of Private Cloud for Dummies eBook.? -- What the f...?[2012-04-19] - 07:44:56 - @pbtomlinson sshhhh, just yanking his chain ;)[2012-04-19] - 07:44:56 - @J4vv4D @pbtomlinson jeez, I need to learn not to take sip of my drink and opening a tweet. Damn that hurts[2012-04-17] - 16:46:54 - RT @bartblaze: RT @ChadChoron: RT @aszy: Malware Memory Analysis - Volatility http://t.co/LcDyWv6J[2012-04-17] - 00:56:57 - PrintJob MITM - Testers Wanted http://t.co/cLQFnnJm by @ChrisJohnRiley[2012-04-16] - 11:56:16 - Wow, a 20 minute kippo ssh session. Someone is a pissed-of intruder. My work here is done :)[2012-04-13] - 04:07:29 - @McGrewSecurity backtrack servers ? Really ? Servers ?[2012-04-12] - 16:20:12 - @McGrewSecurity thanks, I was trying to figure out what all the fuzz was all about. Is that what they call a 0day these days ?
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|