Der Benji ✨ (@spreadthekaozz) 's Twitter Profile
Der Benji ✨

@spreadthekaozz

Father, #DevSecOps, #InfoSec enthusiast, agilist with common sense, and anarchistic chaot (AD&D: Chaotic Good)

ID: 808300697452220416

linkhttps://benjitrapp.github.io calendar_today12-12-2016 13:21:18

2,2K Tweet

130 Followers

1,1K Following

Bilgin Ibryam (@bibryam) 's Twitter Profile Photo

"How Cloud Computing is transforming from raw infra to app-centric services" Longer blog post 👉diagrid.io/blog/evolution… TLDR of timelines, app, infra, API changes 👇🧵(0..4)

"How Cloud Computing is transforming from raw infra to app-centric services"

Longer blog  post  👉diagrid.io/blog/evolution…

TLDR of timelines, app, infra, API changes 👇🧵(0..4)
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Cool secure boot bypass by fault injection in (Espressif) ESP32 CPUs by LimitedResults limitedresults.com/2019/09/pwn-th… #embedded #iot #hardware #faultinjection #infosec

Cool secure boot bypass by fault injection in (Espressif) ESP32 CPUs by <a href="/LimitedResults/">LimitedResults</a>
 
limitedresults.com/2019/09/pwn-th… 

#embedded #iot #hardware #faultinjection #infosec
Blue Team News (@blueteamsec1) 's Twitter Profile Photo

BREAD: BIOS Reverse Engineering & Advanced Debugging - an 'injectable' real-mode x86 debugger that can debug arbitrary real-mode code (on real HW) from another PC via serial cable. dlvr.it/SnDk4F #cyber #threathunting #infosec

BREAD: BIOS Reverse Engineering &amp; Advanced Debugging - an 'injectable' real-mode x86 debugger that can debug arbitrary real-mode code (on real HW) from another PC via serial cable. dlvr.it/SnDk4F #cyber #threathunting #infosec
MG (@_mg_) 's Twitter Profile Photo

Y’all just use 1 data blocker for safe USB charging? Why not use 20 and hope you have enough layers to protect yourself, just like enterprise security services!

Y’all just use 1 data blocker for safe USB charging?

Why not use 20 and hope you have enough layers to protect yourself, just like enterprise security services!
LaurieWired (@lauriewired) 's Twitter Profile Photo

I believe I just discovered a novel technique to get ChatGPT to create Ransomware, Keyloggers, and more. This bypasses the "I'm sorry, I cannot assist" response completely for writing malicious applications. More details in the thread.

I believe I just discovered a novel technique to get ChatGPT to create Ransomware, Keyloggers, and more.

This bypasses the "I'm sorry, I cannot assist" response completely for writing malicious applications.

More details in the thread.
rootsecdev (@rootsecdev) 's Twitter Profile Photo

Microsoft needs to disclose how the MSA consumer account signing keys were stolen. It’s creating a unique problem of distrust in customer reliance on cloud services. This is on Microsoft . At present the explanation is not good enough. Mail Items accessed is throwing up a wall

Dr Milan Milanović (@milan_milanovic) 's Twitter Profile Photo

𝗗𝗼 𝗬𝗼𝘂 𝗡𝗲𝗲𝗱 𝗧𝗼 𝗞𝗻𝗼𝘄 𝗔𝗹𝗹 𝗗𝗲𝘀𝗶𝗴𝗻 𝗣𝗮𝘁𝘁𝗲𝗿𝗻𝘀? The answer is no. Even though we have 23 design patterns, around ten are mostly used in everyday development. Knowing which patterns exist overall is good, but you need to know these very well. Design

𝗗𝗼 𝗬𝗼𝘂 𝗡𝗲𝗲𝗱 𝗧𝗼 𝗞𝗻𝗼𝘄 𝗔𝗹𝗹 𝗗𝗲𝘀𝗶𝗴𝗻 𝗣𝗮𝘁𝘁𝗲𝗿𝗻𝘀?

The answer is no. Even though we have 23 design patterns, around ten are mostly used in everyday development. Knowing which patterns exist overall is good, but you need to know these very well.

Design
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Citrix NetScaler ADC CVE-2023-3519 resources -- Compromise Assessments Cybersecurity and Infrastructure Security Agency advisory cisa.gov/sites/default/… Deyda guide deyda.net/index.php/en/2… -- Vuln Checks Python github.com/telekom-securi… Nmap NSE script github.com/RootUp/Persona… I'm gonna add more links in this🧵

Justin Gardner (@rhynorater) 's Twitter Profile Photo

I've made over 100k on SSRF vulnerabilities. They aren't always as simple as pointing it at localhost or AWS Metadata service. Here are some tricks I've picked up over the past 5 years of web app testing:

I've made over 100k on SSRF vulnerabilities.

They aren't always as simple as pointing it at localhost or AWS Metadata service. 

Here are some tricks I've picked up over the past 5 years of web app testing:
dax (@thdxr) 's Twitter Profile Photo

1. hashicorp locks down terraform license 2. this forces a bunch of companies to get together to fork it into OpenTF 3. it’s on track to be part of CNCF and has more resource allocated to it than Hashicorp’s version at this point Hashicorp should just use OpenTF themselves

Santiago (@svpino) 's Twitter Profile Photo

Scrum is a cancer. I've been writing software for 25 years, and nothing renders a software team useless like Scrum does. Some anecdotes: 1. They tried to convince me that Poker is a planning tool, not a game. 2. If you want to be more efficient, you must add process, not

Scrum is a cancer.

I've been writing software for 25 years, and nothing renders a software team useless like Scrum does.

Some anecdotes:

1. They tried to convince me that Poker is a planning tool, not a game.

2. If you want to be more efficient, you must add process, not