flee74 Profile Banner
Howard (Hyun Jeong) Profile
Howard (Hyun Jeong)

@flee74

Followers
449
Following
211
Media
72
Statuses
3K

Bio

Palo Alto, CA, USA
Joined January 2008
Don't wanna be here? Send us removal request.
@flee74
Howard (Hyun Jeong)
3 years
0
0
2
@flee74
Howard (Hyun Jeong)
6 years
Become a project instructor at Coursera Share your expertise with millions of learners.
0
0
0
@flee74
Howard (Hyun Jeong)
6 years
the era of cancellation, good chance for reconciliation https://t.co/V0rVNs521U
0
0
0
@flee74
Howard (Hyun Jeong)
6 years
Everything is cancelled until Mar. 31st. What is going to happen in Apr. 1st? #COVID19
0
0
0
@thorsheim
Per Thorsheim
6 years
Open Wifi Security (Friday evening rant) 1) Yes, at our @nordic_choice hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to. Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)
37
364
1K
@hashcat
hashcat
6 years
@TihanyiNorbert @spazef0rze @Sc00bzT @DaKnObCS @AaronToponce @m8urnett @whitehatsec @RSnake @thorsheim Here's another one, but with SHA256. For SHA384 it will require some more computing power (printable characters only).
1
13
36
@TihanyiNorbert
Norbert Tihanyi, PhD
6 years
For SHA224 we have PBKDF2-HMAC-SHA224 collision The output is the same for the two string: LTbCSH0TH2KFftkQUDINVjbISYW/ad5ELzlSFA== @spazef0rze , @Sc00bzT , @hashcat , @DaKnObCS , @AaronToponce , @m8urnett , @whitehatsec , @RSnake @thorsheim
8
118
291
@jz__
jz (Heungsoo Kang)
7 years
Free beer!
0
3
4
@flee74
Howard (Hyun Jeong)
7 years
OWASP ZAP to accept user parameters into global variables using extender script in python via jython https://t.co/kaEO7iNqPP
medium.com
Many times, we have the requirement in ZAP that we need input parameter values from the user to execute certain operations in multiple…
0
1
2
@NeverLanCTF
NeverLAN CTF
7 years
Registration is open! Get your team together and head over to https://t.co/dtCvqXP9FJ to get started Event starts January 31st #TeachThemToHack
5
54
100
@flee74
Howard (Hyun Jeong)
7 years
Too good to be true? but still curious what this is about.
0
0
0
@flee74
Howard (Hyun Jeong)
7 years
Don't shop @Target on-line or at least do check offline before you pick your orders up. No notification at all if the order's canceled due to the "technical" issue. #TargetFail #Target #EpicFail
1
0
0
@Louishur
Louis hur
8 years
DEFCON 26 Red Alert ICS CTF by NSHC Please join our event! :) https://t.co/NuB7I6koZp
0
2
6
@Atredis
Atredis Partners
8 years
Here's the deets for this year's BH ticket binary challenge. We've got BH tickets, swag, and party invites for the top players. Good hunting!
5
38
55
@ThePracticalDev
DEV Community
8 years
My list: - Git - Git Kraken - VS Code - Fabric - Rollbar - Bugsnag - Codacy - Code Climate - Circle CI - Blender 3D What's in your toolbox? { author: @lemuelOgbunude } https://t.co/61a7SMzY5x
Tweet card summary image
dev.to
There are a lot of wonderful tools that help us get stuff done quickly, here is a list of some I use.
13
41
354
@WiresharkNews
Wireshark Foundation
8 years
We're twenty years old! Cheers! https://t.co/oXbkGGjE6b
11
174
563
@evdokimovds
Dmitriy Evdokimov
8 years
Interesting slides from #ISSISP18: 1) Symbolic Execution for Vulnerability Detection https://t.co/h6irQHLLL0 2) Symbolic Execution for Vulnerability Repair https://t.co/hqpmtTQyvp 3) Evaluating Fuzz Testing
2
56
130
@igor_chubin
Igor Chubin
8 years
How to get an instant answer to any question on (almost) any programming language from the command line: $ curl https://t.co/9A97GQdoKB $ curl https://t.co/F2XAJAIzDJ $ curl https://t.co/XAKEDhzWjL
6
258
573
@kosamari
Mariko Kosaka
9 years
HTTP what? : I drew what HTTP is & how HTTP1.x and HTTP2 are different✨ (tweetzine, drawsplainer, codedoodles…I don't know what to call it)
143
8K
14K