EmmsSec (@emmssec) 's Twitter Profile
EmmsSec

@emmssec

ID: 1034631073135816705

calendar_today29-08-2018 02:37:25

18 Tweet

42 Followers

430 Following

Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

or 1=1 or 1=1-- or 1=1# or 1=1/* admin' -- admin' # admin'/* admin' or '1'='1 admin' or '1'='1'-- admin' or '1'='1'# admin' or '1'='1'/* admin'or 1=1 or ''=' admin' or 1=1 admin' or 1=1-- admin' or 1=1#

Emad Shanab - أبو عبد الله (@alra3ees) 's Twitter Profile Photo

Web App Hacking Notes. Notes I've taken while working through various web app pentesting labs, tutorials, books, and videos. github.com/tcpiplab/Web-A…

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

Patch your Domain Controllers running DNS (typical config, so most orgs) ASAP. DNS remote code execution vulnerability which runs as LocalSystem on Windows DNS server (usually a DC). portal.msrc.microsoft.com/en-US/security…

Patch your Domain Controllers running DNS (typical config, so most orgs) ASAP.
DNS remote code execution vulnerability which runs as LocalSystem on Windows DNS server (usually a DC).
portal.msrc.microsoft.com/en-US/security…
John Hubbard (@sechubb) 's Twitter Profile Photo

Ever wonder where Windows log descriptions come from? I was going deep on the logging section of my upcoming SANS Institute #SEC450 Blue Team Fundamentals class and ended up with this cool PowerShell command. It dumps all the XML fields and message templates for any event ID!

Ever wonder where Windows log descriptions come from? I was going deep on the logging section of my upcoming <a href="/SANSInstitute/">SANS Institute</a> #SEC450 Blue Team Fundamentals class and ended up with this cool PowerShell command. It dumps all the XML fields and message templates for any event ID!
David Byttow (@davidbyttow) 's Twitter Profile Photo

My mom controlled our AOL account when I was about 13 and would come into my room to sign me in. So, I created an entirely fake AOL login flow in Visual Basic and had her sign me in once to capture the password. Old school phishing.

Dez Blanchfield (@dez_blanchfield) 's Twitter Profile Photo

Ray [REDACTED] don't need the postcode mate, have everything you need Fristname Lastname Card Number Bank Name Issue Date Expiry Date CCV free Pizza's every night till Feb 2023 from what I can see thanks to horizontal "flip" oh, wait, it's safe because he photoshopped out the swipe strip!!

<a href="/RayRedacted/">Ray [REDACTED]</a> don't need the postcode mate, have everything you need

Fristname Lastname
Card Number
Bank Name
Issue Date
Expiry Date
CCV

free Pizza's every night till Feb 2023 from what I can see thanks to horizontal "flip"

oh, wait, it's safe because he photoshopped out the swipe strip!!
Rob Fuller (@mubix) 's Twitter Profile Photo

10 #Log4Shell Facts vs Fiction: a 🧵 1. 1.x is NOT vuln to this RCE. While it doesn't have another RCE, it requires access to send serialized data to a listener ON the log server. This is much MUCH harder to exploit and kind of rare for a Log4j server to be running.