incredincomp's profile picture. WiFi intimidate turned rogue web server. A bunch of 1s and 0s. Red hue in #PurpleTeam. Member: negliGents #=Security+Privacy+Education+📷+🏍+🛹 Views mine +5 pt

IncredInComp

@incredincomp

WiFi intimidate turned rogue web server. A bunch of 1s and 0s. Red hue in #PurpleTeam. Member: negliGents #=Security+Privacy+Education+📷+🏍+🛹 Views mine +5 pt

IncredInComp reposted

The reporting on Elon Musk I've been working on for @newyorker over the past year: newyorker.com/magazine/2023/…


IncredInComp reposted

Running PoC exploit code you find on GitHub has big "Linkin_Park_-_Numb.mp3.exe" energy


IncredInComp reposted

DOJ just released the report from its two-year investigation of the Minneapolis police department. Here's a thread of notable excerpts. This first one happened *while a DOJ investigator was on a ride-along.*

radleybalko's tweet image. DOJ just released the report from its two-year investigation of the Minneapolis police department.

Here's a thread of notable excerpts. 

This first one happened *while a DOJ investigator was on a ride-along.*

IncredInComp reposted

Rapid7's IR team has identified a simple way to determine which data was exfiltrated from #MOVEit customer environments, and how much of it was exfiltrated. We've released this information in our blog, and a @velocidex artifact is in development. rapid7.com/blog/post/2023…

rapid7.com

Observed Exploitation of MOVEit Transfer Vulnerability CVE-2023-34362 | Rapid7 Blog

Observed Exploitation of MOVEit Transfer Vulnerability CVE-2023-34362 | Rapid7 Blog


IncredInComp reposted

I am telling you, without specifics: It does not matter how big your company is. Getting some vendors to fix security issues is just impossible. There's no threats you can make. You're stuck and they know it. But Microsoft. Microsoft can take them to the shed. Globally.


IncredInComp reposted

We're hiring at @bellingcat! We're looking for a US-based researcher/trainer Pay: $55-65k (plus 10% health insurance subsidy, e.g. extra $6k for a $60k salary) Fully remote, occasional travel 25 paid holidays/year Full description and instructions here: bellingcat.com/bellingcat-is-…


IncredInComp reposted

This is cool. Remy (@_mattata) figured out that ChatGPT's new Browser SDK was using some relatively recently known-vulnerable code (specifically MinIO CVE-2023-28432). We're also acutely aware of exploitation in the wild for this vuln literally right now. greynoise.io/blog/openai-mi…

Andrew___Morris's tweet image. This is cool. Remy (@_mattata) figured out that ChatGPT's new Browser SDK was using some relatively recently known-vulnerable code (specifically MinIO CVE-2023-28432). We're also acutely aware of exploitation in the wild for this vuln literally right now.

greynoise.io/blog/openai-mi…
Andrew___Morris's tweet image. This is cool. Remy (@_mattata) figured out that ChatGPT's new Browser SDK was using some relatively recently known-vulnerable code (specifically MinIO CVE-2023-28432). We're also acutely aware of exploitation in the wild for this vuln literally right now.

greynoise.io/blog/openai-mi…
Andrew___Morris's tweet image. This is cool. Remy (@_mattata) figured out that ChatGPT's new Browser SDK was using some relatively recently known-vulnerable code (specifically MinIO CVE-2023-28432). We're also acutely aware of exploitation in the wild for this vuln literally right now.

greynoise.io/blog/openai-mi…
Andrew___Morris's tweet image. This is cool. Remy (@_mattata) figured out that ChatGPT's new Browser SDK was using some relatively recently known-vulnerable code (specifically MinIO CVE-2023-28432). We're also acutely aware of exploitation in the wild for this vuln literally right now.

greynoise.io/blog/openai-mi…

IncredInComp reposted

The team at @OpenAI just fixed a critical account takeover vulnerability I reported few hours ago affecting #ChatGPT. It was possible to takeover someone's account, view their chat history, and access their billing information without them ever realizing it. Breakdown below 👇


IncredInComp reposted

Next BHIS Webcast -- Networking for Pentesters: Beginner w/ @notshenetworks Thursday, 2/9 - 1pm ET (show up early for pre-show banter) Register: zoom.us/webinar/regist… Topics include: - IP addressing - Layer 2 broadcasts - Subnets - VLANs - ARP - NAT - DNS - DHCP - And more!

BHinfoSecurity's tweet image. Next BHIS Webcast -- Networking for Pentesters: Beginner w/ @notshenetworks 

Thursday, 2/9 - 1pm ET (show up early for pre-show banter)

Register: zoom.us/webinar/regist…

Topics include:
- IP addressing
- Layer 2 broadcasts
- Subnets
- VLANs
- ARP
- NAT
- DNS
- DHCP
- And more!

IncredInComp reposted

Good Morning, I feel like we need more car haxs. So here is another vulnerability we found that got us remote commands on every internet connected Nissan & Infiniti. Bug was fixed. shout out to @samwcyo @bbuerhaus @sshell_ @d0nutptr @xEHLE_ @iangcarroll @sshell_ @infosec_au

_specters_'s tweet image. Good Morning, I feel like we need more car haxs. So here is another vulnerability we found that got us remote commands on every internet connected Nissan & Infiniti. Bug was fixed.

shout out to @samwcyo @bbuerhaus @sshell_ @d0nutptr @xEHLE_ @iangcarroll @sshell_ @infosec_au

IncredInComp reposted

More car hacking! Earlier this year, we were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car. Here's how we found it, and how it works:

samwcyo's tweet image. More car hacking!

Earlier this year, we were able to remotely unlock, start, locate, flash, and honk any remotely connected Honda, Nissan, Infiniti, and Acura vehicles, completely unauthorized, knowing only the VIN number of the car.

Here's how we found it, and how it works:

IncredInComp reposted

I hope this inspires a generation of web hackers to look into automotive hacking :D check out @CarHackVillage


IncredInComp reposted

I’ve been doing a bit of work recently, attacking laptops that are protected by Microsoft Bitlocker drive encryption. Join me on a journey where we break into this CEO’s laptop to steal company secrets and plant malware.

SecurityJon's tweet image. I’ve been doing a bit of work recently, attacking laptops that are protected by Microsoft Bitlocker drive encryption.

Join me on a journey where we break into this CEO’s laptop to steal company secrets and plant malware.

The kids are alright ☺️

I'm very happy to say I've been featured on @the_hindu @THChennai Thanks to Mr. @vijaythehindu for the story <3 thehindu.com/news/cities/ch… ❤️@th3cyb3rc0p @HemantSolo @theXSSrat @ADITYASHENDE17 @Pethuraj @HackerGautam @cyph3r_asr @e11i0t_4lders0n See today's Hindu paper 😉

IamRenganathan's tweet image. I&apos;m very happy to say I&apos;ve been featured on @the_hindu @THChennai Thanks to Mr. @vijaythehindu for the story &amp;lt;3

thehindu.com/news/cities/ch… 

❤️@th3cyb3rc0p @HemantSolo @theXSSrat @ADITYASHENDE17 @Pethuraj @HackerGautam @cyph3r_asr @e11i0t_4lders0n 

See today&apos;s Hindu paper 😉


👏 DONT 👏 DEVELOP 👏 0DAYS 👏 FOR 👏 NATION 👏 STATES 👏


IncredInComp reposted

The free RangeForce Community edition has hands-on training modules for Splunk, Regex, YARA, Wireshark and more. 👇🏾

Whether you're changing careers, building skills, or exploring different fields, we believe #cybersecurity learning resources should be accessible to everyone. The RangeForce Community Edition offers 20+ hands-on training modules, all for free. Join now: bit.ly/3wxErdh

RangeForce's tweet image. Whether you&apos;re changing careers, building skills, or exploring different fields, we believe #cybersecurity learning resources should be accessible to everyone. 

The RangeForce Community Edition offers 20+ hands-on training modules, all for free. Join now: bit.ly/3wxErdh


Ya but have you ever tried to work with someone who DOESNT know how to use Microsoft Office?


Loading...

Something went wrong.


Something went wrong.