(~\/~~\/~~\/~~~~\/~~\/~~\/~~~~~~~~~~~~~~~~~~~~~~~~~~~~\/~~\/~~\/~~~~\/~~\/~~\/~)
'\ \/\ \/\ \/~~\ \/\ \/\ \/~~~~~~~~~~~~~~~~~~~~~~~~~~\/ /\/ /\/ /~~\/ /\/ /\/ /'
 /\ \/\ \/\ \  /\ \/\ \/\ \             _            / /\/ /\/ /\  / /\/ /\/ /\ 
/ /\/ /\/ /\ \/ /\/ /\/ /\ \          _\ /_         / /\ \/\ \/\ \/ /\ \/\ \/\ \
| \/ /\/ /\/ || \/ /\/ /\/ |          >_X_<         | \/\ \/\ \/ || \/\ \/\ \/ |
\___/\__/\___/\___/\__/\___/   .---._  /_\  _.---.  \___/\__/\___/\___/\__/\___/
|                            /`.---._`{/ \}`_.---.`\                           |
|                           | /   ___`{\_/}`___   \ |                          |
|                           \ \."`*  `"{_}"`  *`"./ /                          |
|                            \ \  )\  _\ /_  /(  / /                           |
|                             \ *<()( >_X_< )()>* /                            |
|                              |._)/._./_\._.\(_.|                             |
|                              |() () () () () ()|                             |
|        ___                   <<.>><<.>><.>><<.>>                             |
|       -   ---___- ,,        `""""""""",- _~.""""`                |\          |
|          (' ||    ||            _    (' /|               ;        \\         |
|         ((  ||    ||/\\ \\ \\  / \\ ((  ||   ,._-_  /'\\ \\/\/\  / \\        |
|        ((   ||    || || || || || || ((  ||    ||   || || || | | || ||        |
|         (( //     || || || || || ||  ( / |    ||   || || || | | || ||        |
|           -____-  \\ |/ \\/\\ \\_-|   -____-  \\,  \\,/  \\/\\/  \\/         |
|                     _/         /  \       \~~--__                            |
|                               '----`       \     --_                         |
|           .---------------------------------|       \-------------.          |
|           |\________________________/\\____/ -_      \___________/|          |
|           | |            ___-------/\o\\o_/    -_     \         | |          |
|           | |      \   ,-   /_____// \ \`o-_     \     \        | |          |
|           | |       \ /  /=/=---c// / \ \`o -     \     \       | |          |
|           | |       (\ /\//)   c`/ / / \ \`  \     |     \      | |          |
|           | |       ._\/\/_.   `/ / / //  \\ /     |      |     | |          |
|           | |      (({\\//})) // / / //    \\--_   |      |     | |          |
|           | |      / \/\/\/ \/\ / / // /\   \\  \ / \     |     | |          |
|           | |      \/|/~~\|\/\ \ / // /\ \  //  //   \    |     | |          |
|           | |        `/VV\'   \ \ // /  \ \//  /      \   |     | |          |
|           | |         |  |     \ \/ /    \//\          \  |     | |          |
|           | |         \''/      \  //\   //  \          | |     | |          |
|           | |         /~~\       \ \\ \ //\   \         |/      | |          |
|           | |________`____'_______\ \\///__\   |______.//_______| |          |
|           |/                       \ \//    |  |       /         \|          |
|            `-------------------------\//-----|  |------------------'         |
|                                    _        / _/                             |
|                                  _- /__  __/ /                               |
|                                   -_\-_-- __/                                |
_________|-------------------------------------------------------------|________
\       :| )\   /(                                             )\   /( |:      /
  \     :|  )\_/(        WELCOME TO THE THUGCROWD B.B.S.        )\_/(  |:    /
    >   :| (/^|^\)    THE MOST EL8 HACKER M.U.D ON THE 'NET    (/^|^\) |:  >
  /     :|  \*|*/                                               \*|*/  |:    \
/_______:/---\|/-------------------------------------------------\|/---\:______\
              V                       /   \                       V                                  
 _                            )      ((   ))     (                              
(@)                          /|\      ))_((     /|\                           _ 
|-|`\                       / | \    (/\|/\)   / | \                         (@)
| | -----------------------/--|-voV---\`|'/--Vov-|--\------------------------|-|
|-|                             '^`   (o o)  '^`                             | |
| |                                   `\Y/'                                  |-|
|-|      #  #  ##                                                            | |
| |    /## /#  ##/   #                       --- Information --------------  |-|
|-|   / / / #  #  /#  #  #  #   /### /       Time: 9:30 PM America/New_York  | |
| |     # #  # # /  # #   #  # #    /        Date: September 4th, 2018       |-|
|-|     # #   ## #### #   #  #  ###          Location: Twitch or Youtube     | |
| |     / #    # #    #   #  #     ##        Support: Patreon                |-|
|-|       /    '  ##/  ##/ ##/ /###/         Contact: Twitter                | |
| |    /#/                    /              ------------------------------  |-|
|-|   /                                                                      | |
| |   \   > Bitfi retracts claim cryptocurrency wallet is unhackable         |-|
|-|                                                                          | |
| |       > RCE Vuln Fixed in Packagist, PHP's Largest Package Repo          |-|
|-|         > Writeup                                                        | |
| |                                                                          |-|
|-|       > Malware brings San Benito County computers down for              | |
| |         over a week                                                      |-|
|-|                                                                          | |
| |       > Data vandal changes name of New York City to “Jewtropolis”       |-|
|-|         across multiple apps                                             | |
| |                                                                          |-|
|-|       > Russia tries more precise technology to block Telegram           | |
| |                                                                          |-|
|-|       > Sensitive Data Exposure via WiFi Broadcasts in Android OS        | |
| |         [CVE-2018-9489]                                                  |-|
|-|                                                                          | |
| |       > MagentoCore Malware Found on 7,339 Magento Stores                |-|
|-|                                                                          | |
| |       > Spyware Firm Family Orbit Exposed 281GB Of Children’s            |-|
|-|         Data And Photos                                                  | |
| |                                                                          |-|
|-|       > Windows utility used by malware in new information theft         | |
| |         campaigns AKA LOLBAS                                             |-|
|-|                                                                          | |
| |       > ‘CamuBot’ Banking Malware Uses Biometric Bypass                  |-|
|-|                                                                          | |
| |       > Private sector isn’t sharing data with DHS’s threat portal       |-|
|-|                                                                          | |
| |       > Saudi Arabia declares people that post satire on social          |-|
|-|         media can be jailed for up to five years.                        | |
| |                                                                          |-|
|-|       __ ,                                                               | | 
| |     ,-| ~                |\         -__ /\                |\             |-|
|-|    ('||/__,               \\          || \,          _     \\            | |
| |   (( |||  |  /'\\  /'\\  / \\        /|| /    _-_   < \,  / \\  _-_,     |-|
|-|   (( |||==| || || || || || ||        \||/-   || \\  /-|| || || ||_.      | |
| |    ( / |  , || || || || || ||         ||  \  ||/   (( || || ||  ~ ||     |-|
|-|     -____/  \\,/  \\,/   \\/        _---_-|, \\,/   \/\\  \\/  ,-_-      | |
| |                                                                          |-|
|-|       > AWS Full Stackin’ w/ aaS - by @zuphzuph                          | |
| |                                                                          |-|
|-|       > Exploiting Automation in LTE Mobile Networks                     | |
| |                                                                          |-|
|-|                                                                          | |
| |                                                                          |-|
|-|                                                                          | |
|_|__________________________________________________________________________| |
(@)                  l   /\ /         ( (       \ /\   l                   `\|-|
                     l /   V           \ \       V   \ l                     (@)
                     l/                _) )_          \I                        
                                       `\ /'                                    
                                         `                                      
    _______________________________________________________________________
()=(                                                                      (@==()
    '______________________________________________________________________'|
     |                                                                      |
     |          _-_,         ,                                              |
     |            //        ||              ;     '       ;                 |
     |            || \\/\\ =||=  _-_  ,._-_ \\/\ \\  _-_  \\/\/\            |
     |           ~|| || ||  ||  || \\  ||   || | || || \\ || | |            |
     |            || || ||  ||  ||/    ||   || | || ||/   || | |            |
     |          _-_, \\ \\  \\, \\,/   \\,  \\/  \\ \\,/  \\/\\/            |
     |                                                                      |
     |              \'/                                                     |
     |            -= * =-      Speaking With A Level 50 Infosec Mage        |
     |        .-"-. / #,_               Georgia Weidman                     |
     |       / /\_ \  `#|\                                                  |
     |      / /')'\ \  /#/                                                  |
     |     (  \ = /  )/\/#    > Author - Penetration Testing: A Hands-On    |
     |      )  ) (  (/  \                Introduction to Hacking            |
     |     (_.;`"`;._)  |                                                   |
     |    / (  \|/  )   |     Areas of Expertise:                           |
     |   /  /\-'^'-/\   |       > Pentesting                                |
     |  |  \| )=@=(  \_/        > Mobile Security                           |
     |  |  /\/     \            > IoT Security                              |
     |  | /\ \      ;           > Running a Business                        |
     |  \(// /'     |                                                       |
     |     \/       |                                                       |
     |      |     / /         Projects:                                     |
     |      | ___/\_\           > Bulb Security                             |
     |      |/ / \ \|           > Shevirah Inc.                             |
     |     / | | | | \          > Upcoming Book                             |
     |     \_|/   \|_/                                                      |
     |      / \`-'/ \                                                       |
     |      `-'   '-`                                                       |
     |                                                                      |
     |                                                                      |
     |                                                                      |
     |                                                                      |
     |                                                                      |
     |                                                                      |
     |    Contact:                                                          |
     |            Twitter - @georgiaweidman                                 |
     |                                                                      |
    _)______________________________________________________________________|
()=(                                                                       (@==()
    '----------------------------------------------------------------------'

                                Play for Aesthetic



                                  PREV || NEXT