Richard Bethwels(@Cs_richyke) 's Twitter Profileg
Richard Bethwels

@Cs_richyke

#Accountant.
Ethical Hacker

#Cyber_Security
General Computing, Networking, Hacking and Technology
CHELSEA šŸ’™.

ID:1407303222847586304

calendar_today22-06-2021 11:43:49

238 Tweets

1,1K Followers

2,0K Following

Richard Bethwels(@Cs_richyke) 's Twitter Profile Photo

....Many types of threat actors, ranging fromĀ individual criminal hackersĀ to organized crime rings and government agencies, carry out DDoS attacks. In certain situations -- often ones related to poor coding, missingĀ patchesĀ or unstable systems --
āž–@TermuxForAndroid

account_circle
Richard Bethwels(@Cs_richyke) 's Twitter Profile Photo

....TheĀ floodĀ of incoming messages, connection requests or malformedĀ packetsĀ to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

account_circle
Richard Bethwels(@Cs_richyke) 's Twitter Profile Photo

ā‡ļø What is a DDoS attack ?

In a distributed denial-of-service (DDoS) attack, multiple compromised computer systems attack a target and cause aĀ denial of serviceĀ for users of the targeted resource. The target can be a server, website or other network resource.

account_circle
Linux Kernel Security(@linkersec) 's Twitter Profile Photo

DirtyCred Remastered: how to turn an UAF into Privilege Escalation

LukeGix and Alessandro Groppo published two articles about exploiting CVE-2022-2602, another use-after-free in the io_uring subsystem.

[1] exploiter.dev/blog/2022/CVE-ā€¦

[2] blog.hacktivesecurity.com/index.php/2022ā€¦

account_circle