jz (Heungsoo Kang)

1K posts

jz (Heungsoo Kang) banner
jz (Heungsoo Kang)

jz (Heungsoo Kang)

@jz__

Reverse engineering, obfuscation, APT track, tool writing, etc

Burnaby, BC Canada Katılım Ağustos 2009
311 Takip Edilen436 Takipçiler
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
@SalenoXP I'm also looking into this, but missing of the version COULD be due to the axios compromise, or COULD ALSO be due to the leak.
English
0
0
1
47
Saleno
Saleno@SalenoXP·
I swear I updated to Claude Code 2.1.88 earlier today, but now its back to 2.1.87. This COULDN'T be Axios related right?
English
1
0
1
165
CHA Minseok(Jacky)
CHA Minseok(Jacky)@xcoolcat7·
아들 아프다고해서 (그냥 게임하고 싶을지도) 장모님과 처제와 어디 가는 중인데. 가시방석(?!) …
한국어
1
0
2
258
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
for i in range(100): remind_to_self("I will never buy HP printer ever again") bought a printer ink cartridge for my folks from hp.com, which does not work with error message. HP refuses to refund. thank you @HP @HPSupport
English
1
0
1
123
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
@nakulmk Hello Mr Nakul, I'm Kang, DOSI security team. My colleague in DOSI(xxx@linecorp) got an email from you and we're not sure if it's legit. Can you confirm?
English
0
0
0
11
The Real World
The Real World@AccessTRW·
Piers Morgan calls out Andrew Tate for spreading misinformation about the Southport stabber who killed 3 little girls: “— Almost everything you said in that video was completely untrue. Why did you race to spread such woeful disinformation given the massive following you have?”
English
137
128
926
286.3K
Vincent Flibustier 👽
Vincent Flibustier 👽@vinceflibustier·
First day at Crowdstrike, pushed a little update and taking the afternoon off ✌️
Vincent Flibustier 👽 tweet media
English
2.7K
31.2K
399.7K
46.9M
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
Favorite scene in Inside Out 2. "Maybe this is what happens when you grow up, you feel less joy"
jz (Heungsoo Kang) tweet media
English
0
0
1
195
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
우리은행 WON인증서 발급하려다가 스트레스받아 기절하는줄 알았다. 간만에 코리안 뱅킹 살짝 맛봤더니...
한국어
0
0
0
145
Boris Larin
Boris Larin@oct0xor·
This year we are organizing the SAS CTF with VERY fun reverse engineering challenges and the top teams/players will fly to the Security Analyst Summit (@TheSAScon) to compete for $18,000 in prizes. Register now! ctf.thesascon.com
Boris Larin tweet media
English
1
6
11
7.5K
Seongsu Park
Seongsu Park@unpacker·
After 7.5 incredible years, today marks my last day with the GReAT. It’s been an honor working alongside such amazing colleagues. Thank you for the memories and support throughout this journey. 🙇
Seongsu Park tweet media
English
8
2
82
7.4K
jz (Heungsoo Kang)
jz (Heungsoo Kang)@jz__·
Getting into Ivanti CVE-2024-21893 In-the-Wild hackers' backdoor: 0. SSRF on saml-server will exploit CVE-2024-21887 vulnerability by bypassing mitigation and will likely crash saml-server 1. In the admin panel, get process snapshot (Troubleshooting > System snapshot) 2. Decrypt snapshot with pulse-meter.py (github.com/rxwx/pulse-met…) 3. $ tar xvf snapshot.decrypted -> It'll dump coredump (CORE.saml-server.PID) 4. $ strings CORE.saml-server.PID | grep setcookie -> you'll see attacker's saml xml payload 5. decode (URL, base64) payload and you'll get backdoored version of setcookie.thtml.ttc following is the backdoored part: $output .= "\n"; "LIONOPS" is the keyword parameter to backdoor, so if you do something like: $ curl https://your_vpn_server/dana-na/auth/setcookie.cgi?LIONOPS= then backdoored device is likely to respond with 'a' * 100 #LINESecurity #ivanti #LIONOPS
jz (Heungsoo Kang) tweet media
English
0
13
51
5.5K