Alyosha Sintsov (@asintsov) 's Twitter Profile
Alyosha Sintsov

@asintsov

was born in '85, still alive...

ID: 117680819

calendar_today26-02-2010 08:03:01

4,4K Tweet

3,3K Takipçi

534 Takip Edilen

PT SWARM (@ptswarm) 's Twitter Profile Photo

📝New research by Impact: "Fork Bomb for Flutter" There are more and more Flutter applications, and security analysis of these apps is in high demand. Our member Phil shares his knowledge and presents his reFlutter tool. Read the article: swarm.ptsecurity.com/fork-bomb-for-…

Matt Kelly (@breakersall) 's Twitter Profile Photo

How to do a $50k social engineering pentest in a couple minutes via OpenAI playground. 1/2: Create a EC2 instance with EvilGenX 3. Limit your firewall via iptables to only accept target IP addresses 4. Purchase a domain 🧵 1/2

How to do a $50k social engineering pentest in a couple minutes via OpenAI playground.
1/2: Create a EC2 instance with EvilGenX
3. Limit your firewall via iptables to only accept target IP addresses
4. Purchase a domain

🧵 1/2
Alyosha Sintsov (@asintsov) 's Twitter Profile Photo

Also found interesting, that ChatGPT works much better if you ask to use LangSec approach: translate logic into grammar, and input as a language and try to find a Weird Machine, works more efficient at my example than just "check the pseudocode/logic for security issues"

Alex Matrosov (@matrosov) 's Twitter Profile Photo

"... detected several remotely exploitable bugs in AMI MegaRAC BMC" "... whole attack sequence: from having zero knowledge about a remote AMI BMC with enabled IPMI (yeah, right) to flashing a persistent firmware implant to the server SPI flash" Looking forward to this talk!

Alex Matrosov (@matrosov) 's Twitter Profile Photo

Application Security and Vulnerability Assessment getting a significant advantage from GenAI (context-driven knowledgebase). That helps security teams understand the root cause of the problem faster and significantly reduces the latency in producing security fixes at scale.

Application Security and Vulnerability Assessment getting a significant advantage from GenAI (context-driven knowledgebase). That helps security teams understand the root cause of the problem faster and significantly reduces the latency in producing security fixes at scale.
Cristofaro Mune (@pulsoid) 's Twitter Profile Photo

Let me say that again... You store pointers at the _destination_ address of a memcpy. You glitch during memcpy (). You get that pointer into PC. No, it's not sci-fi. It's the "instruction corruption" fault model. And we pioneered that. See thread below 1/N.

Alyosha Sintsov (@asintsov) 's Twitter Profile Photo

How can we measure the Return on Security Investment (RoSI) of Bug Bounty programs? Yuri Goltsev and I have explored various numbers to find answers, and we'd like to share our ideas with you - linkedin.com/pulse/how-meas…! #ROI #bugbounty #metrics #okr