recentpopularlog in
« earlier  
Twitter
GitMiner : Tool for advanced mining for content on Github : cc
9 hours ago
Twitter
I'll be leading two training classes. Stay tuned for details!
15 hours ago
Twitter
Some sculptor did a hell of a job. See what I did there?
yesterday
Twitter
RT : being born in the late '70s is kind of like being a Gen X/Millennial daywalker; I know how to write cursive and use…
yesterday
Twitter
You will be paid twice as much and have slightly better job mobility than Dall…
yesterday
Twitter
Got his first set of vaccinations today. I couldn't believe how massive the needles were in relation to him. He cri…
yesterday
Twitter
Ayo, Public Service Announcement:
1. You are smart enough to come on our show.
2. You are cool enough to hang out.…
yesterday
Rotten Potato | Penetration Testing Lab
However there is a technique which can be used that tries to trick the “NT Authority\System” account to negotiate and authenticate via NTLM locally so the token for the “NT Authority\System” account would become available and therefore privilege escalation possible. This technique is called Rotten Potato and it was introduced in DerbyCon 2016 by Stephen Breen and Chris Mallz.
windows  privesc  privilegeescalation  pentest  security 
yesterday
GitHub - quentinhardy/odat: ODAT: Oracle Database Attacking Tool
ODAT (Oracle Database Attacking Tool) is an open source penetration testing tool that tests the security of Oracle Databases remotely.
oracle  database  pentest  security  tool 
yesterday
Twitter
Why lie? Works on me.
yesterday
Twitter
When something has many qualities of a conspiracy, but isn't a conspiracy, it is often a Schelling point among clev…
yesterday
Truncating Payloads and Anonymizing PCAP files - SANS Internet Storm Center
Sometimes, you may need to provide PCAP files to third-party organizations like a vendor support team to investigate a problem with your network. I was looking for a small tool to anonymize network traffic but also to restrict data to packet headers (and drop the payload). Google pointed me to a tool called ‘TCPurify’. 
pcap  tcpdump 
yesterday
NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other “High Potential” Targets
The NSA’s ability to crack into sensitive VPNs belonging to large organizations, all the way back in 2006, raises broader questions about the security of such networks. Many consumers pay for access to VPNs in order to mask the origin of their internet traffic from the sites they visit, hide their surfing habits from their internet service providers, and to protect against eavesdroppers on public Wi-Fi networks.
security  nsa  vpn 
yesterday
Installing a Kubernetes 1.11 Cluster On CentOS 7.5(1804) The Manual Way - Installing 3 Master Nodes, Etcd - Part 1 | Eli's Blog
While there are many places describing the Kubernetes installation process, they mostly use the kubeadm utility. which is not officially support for a multi-master configuration. in the next few articles, I will be showing you how to configure a Kubernetes cluster manually without using the kubeadm utility.
kubernetes 
yesterday
We’re in a new age of obesity. How did it happen? You’d be surprised | George Monbiot | Opinion | The Guardian
Yes, we ate more in 1976, but differently. Today, we buy half as much fresh milk per person, but five times more yoghurt, three times more ice cream and – wait for it – 39 times as many dairy desserts. We buy half as many eggs as in 1976, but a third more breakfast cereals and twice the cereal snacks; half the total potatoes, but three times the crisps. While our direct purchases of sugar have sharply declined, the sugar we consume in drinks and confectionery is likely to have rocketed
exercise  food  diet  nutrition  obesity 
yesterday
Veritas® Traveller's Doorstop - Lee Valley Tools
To use it, you just slide the wedge under the door and elevate it with the screw until the door is solidly wedged. Anyone attempting entry causes the door to wedge tighter in the frame while the pointed screw keeps the wedge from shifting. The screw can be used with concrete subfloors as well as the traditional carpet-covered subfloors.

It does not damage carpeting unless there is an attempted forced entry; it then penetrates the subfloor as the pressure on the wedge increases. But then, which would you prefer, a dent in the subfloor or an unwanted visitor? The lever handle gives you substantial mechanical advantage, making it easy to turn the screw.
security  travel 
2 days ago
Twitter
Sysadmins have used "lazy" as a desirable characteristic for a long time, as a description of the "automate anythin…
2 days ago
Twitter
May I suggest that you adjust your focus to get self-worth and value out of the knowledge your are contributing to…
2 days ago
Twitter
authors acknowledge many ideas aren't new - but I think many are also (much mor…
2 days ago
Twitter
Criticising Islam is a “gateway drug” toward anti-Muslim hate as much criticising western foreign policy is a “gate…
2 days ago
Twitter
Part 1 – Reverse Engineering Password Protected Reverse Shells – Linux x64: ,Rev Engineerin…
2 days ago
Twitter
Your daily reminder that the political class have more in common with each other than they do with us
2 days ago
Twitter
totally normal for a property developer with $84 billion of net debt
2 days ago
Twitter
Handy! Just learned AWS EC2 instances have metadata that can be queried via HTTP GET requests. Example, get the pub…
2 days ago
Twitter
Not 100% sure if it was you but I may have been the guy sitting across from you joking abou…
2 days ago
Twitter
AWS. Interviewed in Seattle in December. 72 straight hours of rain and the sun set at 4:30 so it was very mutual…
2 days ago
Twitter
I let housekeeping in and I get why the checks are done (in…
2 days ago
Twitter
I knew about the checks before I went, and have since learn…
2 days ago
Twitter
Found a super spicy 🌶️ take on an file (launched by Excel) while going through my file collections today.

• 0…
2 days ago
Twitter
Some personal good news:

Got promoted to Technical Director / Red Team Ops at my Fortune X employer.

I’ve been to…
2 days ago
Twitter
Add to basket!
2 days ago
Big CIFS/SMB3 Improvements Head To Linux 4.19 - Phoronix
RT : SMBv3 enhancements are coming to Linux 4.19, including ACL support ( )
2 days ago
Twitter
Moe Bius runs the lockpick room at . I endorse her for this product and/or service.
2 days ago
Twitter
RT : It’s only a matter of time until employers realize the Myers-Briggs types are meaningless and then only a matter of…
2 days ago
Twitter
Will this not produce the same issue as higher education "vouchers" (i.e., student loans and grants) wh…
2 days ago
Twitter
I'll have "things we should have seen coming" for 800, Alex.
2 days ago
Twitter
I can't imagine a more horrific location. Upside: mos…
2 days ago
Twitter
“Several sources confirm that the FBI alert was related to a breach of the Cosmos bank in India. According to multi…
3 days ago
Twitter
We've just tagged BloodHound 2.0.1 which contains several bugfixes, many from our awesome community. Highly recomme…
3 days ago
Twitter
There are at least five years’ worth of registration stickers on this plate, meaning someone woke up to find their…
3 days ago
Twitter
I went to this talk at DEF CON and want to go ahead and kill the FUD on this. I’ll preface it by saying that the re…
3 days ago
Twitter
The whitepaper for my Black Hat and DEF CON talk is now available
3 days ago
Twitter
working on my skills and just got of , this was a good one!! thx
3 days ago
Twitter
Installing, Configuring 3 Node Kubernetes(master) Cluster on CentOS 7.5 - Adding / Configuring CoreDNS - Part 5…
3 days ago
Twitter
If I were an attacker and had a foothold on a network, I’d move laterally to the vuln scanning servers if I could a…
3 days ago
Twitter
C'mon, all the cool (and security savvy) kids are heading to campus with YubiKeys
3 days ago
Algorithm Repository
This page provides a comprehensive collection of algorithm implementations for seventy-five of the most fundamental problems in combinatorial algorithms. The problem taxonomy, implementations, and supporting material are all drawn from my book The Algorithm Design Manual. Since the practical person is more often looking for a program than an algorithm, we provide pointers to solid implementations of useful algorithms when they are available.
algorithms  programming 
3 days ago
Aho/Ullman Foundations of Computer Science
This book has been taken out of print by W. H. Freeman. You are welcome to use it if you like. We believed in 1992 it was the way to introduce theory in Computer Science, and we believe that today.
algorithms  book  books  programming 
3 days ago
Twitter
Upon returning from , I was greeted by my mgr telling me how it was a waste of my time and that be…
3 days ago
Twitter
Updated with background details, Red Hat's short explanation video, and links to Intel's deep dive.

This affects o…
3 days ago
Laziness Does Not Exist – E Price – Medium
When a person fails to begin a project that they care about, it’s typically due to either a) anxiety about their attempts not being “good enough” or b) confusion about what the first steps of the task are.
psychology 
3 days ago
VIM and Python – A Match Made in Heaven – Real Python
On the down side though, VIM can be a pain to configure, but fear not. This article will show you how to get a powerful VIM environment set up in a way that is geared towards wrangling Python day in and day out.
python  vim  editor  programming 
3 days ago
Twitter
Perform a MitM attack and extract clear text credentials from RDP connections

3 days ago
Twitter
Those beers will all expire.
4 days ago
Twitter
Got my kid a 5-lock progressive teaching set with picks at Defcon. 12 hours after giving it to him he beat the fin…
4 days ago
(429) https://twitter.com/i/web/status/1029172612184850433
It's also not a DEFCON policy, it's a hotel policy, so InfoSec people are getting blamed…
4 days ago
Twitter
Orlando won't work. Disney no longer even allows do not disturb signs. H…
4 days ago
Twitter
My review of : It was incredible. I learned a ton, met some amazing people (even being as anti-social as…
4 days ago
Twitter
RT : My wife and I recently got married and decided that neither of us would change our last names. Some people disagree…
5 days ago
Twitter
My total pull from DC26... So much to play with for the next few months. Thanks to all the amazing creat…
5 days ago
Twitter
I frequently receive the question about the content and whether it is worth it to take SEC642... Join this webcast…
5 days ago
Twitter
If you're running Win10 Fall Creators Update or later, open the Start Menu, and type "EMET" it brings up the Exploi…
5 days ago
Twitter
Just posted a new guide on
5 days ago
Twitter
Earlier this year I found a privesc bug that affects Windows 10 / Server 2016 and it should be patched tomorrow und…
5 days ago
Twitter
RouterSploit v3.3.0 - Exploitation Framework For Embedded Devices
5 days ago
Twitter
I agree. I haven't been to all of these (plus and and ) but I've hit several. I got…
5 days ago
Twitter
Retweeting myself because TIL. I was already aware of Vegas before Defcon, but at least in theory room checks are…
5 days ago
Twitter
Actually a little more Googling makes me think it's already the unpublicized new normal worldwide. Hilton…
5 days ago
Twitter
I dunno what to tell you. Those articles are national press and I read more than one, but I seem to be un…
5 days ago
Twitter
They didn't call attention to it at Mandalay Bay either, which for sure they should. But it's in my reser…
5 days ago
Twitter
This article (from March) has a longish list of companies that do it…
5 days ago
Twitter
I'm a fairly regular visitor to Las Vegas (twice since January, at thr…
5 days ago
« earlier      
per page:    204080120160

Copy this bookmark:





to read