Expl0itn3twork Profile Banner
Exploitnetworking Profile
Exploitnetworking

@Expl0itn3twork

Followers
62
Following
476
Media
25
Statuses
285

Joined June 2018
Don't wanna be here? Send us removal request.
@Expl0itn3twork
Exploitnetworking
5 years
#Cyber #security is becoming more and more important and securing your server with automation allows us to save a lot of time and respect best practices: https://t.co/0phJek3xgd
0
0
0
@Expl0itn3twork
Exploitnetworking
5 years
Today we will see how we can use the #Lambda #Edge to insert β€œ/index.html” at the end of the URLs of a static site distributed by #AWS #Cloudfront https://t.co/TpJt8VayFo
0
1
0
@Expl0itn3twork
Exploitnetworking
5 years
Install and configure Lsync service to synchronize paths between servers (deployed by #puppet) https://t.co/TQuHHiNvAH
0
0
0
@Expl0itn3twork
Exploitnetworking
6 years
Today we see as install #Apache in CentOS and configure #ALB with #HTTPS certificate https://t.co/ranFWSXvuk
0
0
0
@Expl0itn3twork
Exploitnetworking
6 years
#2020 is the year of #darkscreen and many applications have this new feature (natively or with third party tools). So we will see how convert our screen to the dark side. #google #telegram #ios #apple #whatsapp #chrome https://t.co/rCKq7Jv1uI
0
0
0
@Expl0itn3twork
Exploitnetworking
6 years
In this article we use #Terraform for create automaticaly a #Cloudfront, bucket #S3 not public (Origin Access Identity) and a Certificate Manager for validate the static website. https://t.co/HQUCNS8gbv
0
0
0
@Expl0itn3twork
Exploitnetworking
6 years
Inside #AWS account there is the possibility to delegate the control of volume to external consulant. If you don’t want people to manage resources that don’t belong to them, you need to use an #EC2 policies for limit their control. https://t.co/rewAhrC4Mk
0
0
0
@Expl0itn3twork
Exploitnetworking
6 years
When you create a private gateway #API, you can contact it through the #DNS name, but it is resolves only in your #VPC with a VPC Endpoint with Private DNS enabled. #AWS https://t.co/qL6wIP9hYD
0
0
0
@sk4pwn
Daniele Scanu
6 years
A new @pwnagotchi unit is now alive! 😁 Next step is insert the display!
0
2
15
@sk4pwn
Daniele Scanu
6 years
Writeup box on @hackthebox_eu was been retired! I'm honorated to see @ippsec that use my script for exploit the SQL injection 😁 and thanks @ATeamJKR for the funny box!
0
1
7
@sk4pwn
Daniele Scanu
6 years
Serial 2 is online! Try it via @VulnHub πŸ˜‰ #infosec #CyberSecurity #ctf #Hacking
@VulnHub
Vuln Hub
6 years
[Brand new VM] "serial: 2" by @sk4pwn ~ https://t.co/tK48F5RPA6
0
7
13
@sk4pwn
Daniele Scanu
6 years
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer
0
1
1
@sk4pwn
Daniele Scanu
6 years
I've just submitted a new box on VulnHub! Serial 2 will be released soon! Stay tuned! πŸ˜‰ #Hacking #infosec #CyberSecurity #ctf
0
3
5
@sk4pwn
Daniele Scanu
6 years
ska just owned root on Safe ! https://t.co/9G3shLaFjp via @hackthebox_eu
0
1
4
@sk4pwn
Daniele Scanu
6 years
Tonight a little challenge of arm binary exploitation! #hacking #infosec #IoTSecurity #cybersec
0
1
4
@sk4pwn
Daniele Scanu
6 years
ska just owned root on Bitlab ! https://t.co/9G3shLaFjp via @hackthebox_eu
1
1
4
@sk4pwn
Daniele Scanu
6 years
Two new cve were been assigned on my findings on @pimcore CMS: CVE-2019-16317 and CVE-2019-16318! Both can lead to remote code execution, the first one using phar wrapper! Was been very fun exploit it! #infosec #CyberSecurity #Security
0
3
6
@sk4pwn
Daniele Scanu
6 years
Nice walkthrough by @deepaky_1257! #infosec #CyberSecurity #ctf
@0xmon3L
mon3L
6 years
@sk4pwn @VulnHub here is the walkthrough of Serial:1 Machine walkthrough = https://t.co/G3CHQjx3G5
0
1
1
@sk4pwn
Daniele Scanu
6 years
I've done a nmap on Android box for TV and I've found the port 5555 open used by adb. I'm used adb for connect to it, result: adb shell with root permission πŸ€”πŸ€”πŸ€” nice😁 #CyberSecurity #infosec #Hacking #Android #smart #IoT
2
1
5