Matasareanu
Members-
Posts
30 -
Joined
-
Last visited
Everything posted by Matasareanu
-
@spiderincearca https://parsec.app daca nu ai rezolvat pana acum.
-
Primiti doar vaccinati, nu?
-
Asta e un pic mai rasarit. Cel putin pentru Germana. https://www.deepl.com/en/translator
-
Pot sa incerce 😂
-
Senior Application Security Tester (Pentest)
Matasareanu replied to Zatarra's topic in Locuri de munca
Am un deja-vu -
NetRipper - Smart traffic sniffing for penetration testers
Matasareanu replied to em's topic in Anunturi importante
Ne pregatim de conferinta ? -
Perioada mereu a cam fost aceasi, plus minus o saptamana. Despre voluntariat, poti aplica aici cred https://def.camp/become-a-volunteer/ si te contacteaza ei. Le poti scrie si pe FB si or sa iti raspunda
-
Nu stiu, nu detin. Doar stiu ca citisem faza cu VISA. Poate te ajuta asta: https://steemit.com/bitcoin/@bitcoinshirtz/a-full-list-of-bitcoin-debit-cards-for-2017
-
Ce detalii te-ar interesa? @Andrei cred ca poate sa te ajute. Intreaba aici si daca stim si noi, iti raspundem.
-
E card VISA sau Mastercard? Am vazut pe undeva ca VISA parca au cerut blocarea tuturor cardurilor care au treaba cu BTC. https://www.newsbtc.com/2018/01/06/visa-suspends-bitcoin-debit-cards-issued-wavecrest/
-
Care e mai exact intrebarea? Eu am gasit in 2 sec pe google inmultirea a doua numere in asm. http://cssimplified.com/computer-organisation-and-assembly-language-programming/an-assembly-program-to-read-two-decimal-numbers-then-multiply-them-together-and-finally-print-out-the-result-in-decimal
-
Slideurile si videourile de la DefCamp 2017 sunt up: https://def.camp/archives/2017/ Have fun!
-
Acum vreo doua saptamani userul chethan177 a postat pe Apple development forum si well, Apple missed it Momentul ala cand lumea il considera feature. Se pare ca mizeria merge si remote daca ai Screen sharing activat. Temp fix: parola custom pusa pentru root. Disable root user nu afecteaza. Eu personal nu am putut reproduce pe doua mac-uri mai vechiute(un air si un pro) cu High Sierra pe ele. Tot upgrade de la Sierra.
-
Ti-am dat un PM.
-
WiFi Krack (key reinstallation attacks) - all WiFi vulnerable
Matasareanu replied to QuoVadis's topic in Stiri securitate
Cea mai ok explicatie de pana acum pe care am gasit-o: -
dictionar cuvinte romana + nume / prenume romana
Matasareanu replied to mickeyi's topic in Wireless Pentesting
Ai aici o parte din cuvintele dex-online.ro : https://dexonline.ro/static/download/dex-database.sql.gz Si aici gasesti o lista de prenume pe care o poti folosi: https://ro.wikipedia.org/wiki/Listă_de_prenume_românești -
WiFi Krack (key reinstallation attacks) - all WiFi vulnerable
Matasareanu replied to QuoVadis's topic in Stiri securitate
Si ce te faci cand ai doar asa ceva in casa: https://goo.gl/images/LCN4rK ? -
WiFi Krack (key reinstallation attacks) - all WiFi vulnerable
Matasareanu replied to QuoVadis's topic in Stiri securitate
1. Updateuri e posibil sa nu vedem prea curand. Avand in vedere ca sunt routere vechi peste tot care nu au mai primit de secole updateuri sau nu o sa stea nimeni sa faca updateuri. 2. Nu cred ca ajuta. E in protocol vulnerabilitatea. 3. WiFi-ul in sine ca si canal de comunicatie face broadcast in aer. Nu este single channel ca prin cablu 4. cred ca momentan este cam singura solutie. 5. doar mitigheaza riscul de MiTM cu astea. 6. asta cred ca este cel mai important. In concluzie cred ca doar sa ai un server de vpn in LAN ar mitiga problema. Chiar daca esti interceptat o sa fie gibberish. Alta problema: Toate IoT devices need to be burned. Majoritatea nu or sa primeasca updateuri la wpa_supplicant. Toate deviceurile cu XP care mai exista nu or sa primeasca update, deci or sa fie easy targets. -
Penetration Tester/Ethical Hacker @ KPMG Romania
Matasareanu replied to SirGod's topic in Locuri de munca
@Nytro ai dat select in baza dupa IP ? -
Title:Phishy Basic Authentication prompts URL: https://securitycafe.ro/2017/09/06/phishy-basic-authentication-prompts/ Author: @TheTime
-
Going Further with Responder's Basic Authentication There are a good number of situations when we find ourselves abusing the LLMNR and NBT-NS protocols on an infrastructure penetration test, more specifically on an Active Directory setup. These 2 protocols are enabled by default on most of the Windows operating systems. What are they doing is they facilitate the communication between network machines when searching for a DNS hostname regardless if it’s a share, a server or a web hostname. The overview picture of the attack vector: the victim is looking for a non-existing hostname the DNS server cannot resolve the request we reply and resolve the hostname resolution query we ask the victim for authentication
-
- 4
-
https://isc.sans.edu/podcast.html - A ajuns si in daily podcastul de la SANS https://traffic.libsyn.com/securitypodcast/5339.mp3
-
VPN Split Traffic
Matasareanu replied to Matasareanu's topic in Sisteme de operare si discutii hardware
Ok. Multumesc mult.