(~\/~~\/~~\/~~~~\/~~\/~~\/~~~~~~~~~~~~~~~~~~~~~~~~~~~~\/~~\/~~\/~~~~\/~~\/~~\/~)
'\ \/\ \/\ \/~~\ \/\ \/\ \/~~~~~~~~~~~~~~~~~~~~~~~~~~\/ /\/ /\/ /~~\/ /\/ /\/ /'
/\ \/\ \/\ \ /\ \/\ \/\ \ _ / /\/ /\/ /\ / /\/ /\/ /\
/ /\/ /\/ /\ \/ /\/ /\/ /\ \ _\ /_ / /\ \/\ \/\ \/ /\ \/\ \/\ \
| \/ /\/ /\/ || \/ /\/ /\/ | >_X_< | \/\ \/\ \/ || \/\ \/\ \/ |
\___/\__/\___/\___/\__/\___/ .---._ /_\ _.---. \___/\__/\___/\___/\__/\___/
| /`.---._`{/ \}`_.---.`\ |
| | / ___`{\_/}`___ \ | |
| \ \."`* `"{_}"` *`"./ / |
| \ \ )\ _\ /_ /( / / |
| \ *<()( >_X_< )()>* / |
| |._)/._./_\._.\(_.| |
| |() () () () () ()| |
| ___ <<.>><<.>><.>><<.>> |
| - ---___- ,, `""""""""",- _~.""""` |\ |
| (' || || _ (' /| ; \\ |
| (( || ||/\\ \\ \\ / \\ (( || ,._-_ /'\\ \\/\/\ / \\ |
| (( || || || || || || || (( || || || || || | | || || |
| (( // || || || || || || ( / | || || || || | | || || |
| -____- \\ |/ \\/\\ \\_-| -____- \\, \\,/ \\/\\/ \\/ |
| _/ / \ \~~--__ |
| '----` \ --_ |
| .---------------------------------| \-------------. |
| |\________________________/\\____/ -_ \___________/| |
| | | ___-------/\o\\o_/ -_ \ | | |
| | | \ ,- /_____// \ \`o-_ \ \ | | |
| | | \ / /=/=---c// / \ \`o - \ \ | | |
| | | (\ /\//) c`/ / / \ \` \ | \ | | |
| | | ._\/\/_. `/ / / // \\ / | | | | |
| | | (({\\//})) // / / // \\--_ | | | | |
| | | / \/\/\/ \/\ / / // /\ \\ \ / \ | | | |
| | | \/|/~~\|\/\ \ / // /\ \ // // \ | | | |
| | | `/VV\' \ \ // / \ \// / \ | | | |
| | | | | \ \/ / \//\ \ | | | |
| | | \''/ \ //\ // \ | | | | |
| | | /~~\ \ \\ \ //\ \ |/ | | |
| | |________`____'_______\ \\///__\ |______.//_______| | |
| |/ \ \// | | / \| |
| `-------------------------\//-----| |------------------' |
| _ / _/ |
| _- /__ __/ / |
| -_\-_-- __/ |
_________|-------------------------------------------------------------|________
\ :| )\ /( )\ /( |: /
\ :| )\_/( WELCOME TO THE THUGCROWD B.B.S. )\_/( |: /
> :| (/^|^\) THE MOST EL8 HACKER M.U.D ON THE 'NET (/^|^\) |: >
/ :| \*|*/ \*|*/ |: \
/_______:/---\|/-------------------------------------------------\|/---\:______\
V / \ V
_ ) (( )) (
(@) /|\ ))_(( /|\ _
|-|`\ / | \ (/\|/\) / | \ (@)
| | -----------------------/--|-voV---\`|'/--Vov-|--\------------------------|-|
|-| '^` (o o) '^` | |
| | `\Y/' |-|
|-| # # ## | |
| | /## /# ##/ # --- Information -------------- |-|
|-| / / / # # /# # # # /### / Time: 9:30 PM America/New_York | |
| | # # # # / # # # # # / Date: September 4th, 2018 |-|
|-| # # ## #### # # # ### Location: Twitch or Youtube | |
| | / # # # # # # ## Support: Patreon |-|
|-| / ' ##/ ##/ ##/ /###/ Contact: Twitter | |
| | /#/ / ------------------------------ |-|
|-| / | |
| | \ > Bitfi retracts claim cryptocurrency wallet is unhackable |-|
|-| | |
| | > RCE Vuln Fixed in Packagist, PHP's Largest Package Repo |-|
|-| > Writeup | |
| | |-|
|-| > Malware brings San Benito County computers down for | |
| | over a week |-|
|-| | |
| | > Data vandal changes name of New York City to “Jewtropolis” |-|
|-| across multiple apps | |
| | |-|
|-| > Russia tries more precise technology to block Telegram | |
| | |-|
|-| > Sensitive Data Exposure via WiFi Broadcasts in Android OS | |
| | [CVE-2018-9489] |-|
|-| | |
| | > MagentoCore Malware Found on 7,339 Magento Stores |-|
|-| | |
| | > Spyware Firm Family Orbit Exposed 281GB Of Children’s |-|
|-| Data And Photos | |
| | |-|
|-| > Windows utility used by malware in new information theft | |
| | campaigns AKA LOLBAS |-|
|-| | |
| | > ‘CamuBot’ Banking Malware Uses Biometric Bypass |-|
|-| | |
| | > Private sector isn’t sharing data with DHS’s threat portal |-|
|-| | |
| | > Saudi Arabia declares people that post satire on social |-|
|-| media can be jailed for up to five years. | |
| | |-|
|-| __ , | |
| | ,-| ~ |\ -__ /\ |\ |-|
|-| ('||/__, \\ || \, _ \\ | |
| | (( ||| | /'\\ /'\\ / \\ /|| / _-_ < \, / \\ _-_, |-|
|-| (( |||==| || || || || || || \||/- || \\ /-|| || || ||_. | |
| | ( / | , || || || || || || || \ ||/ (( || || || ~ || |-|
|-| -____/ \\,/ \\,/ \\/ _---_-|, \\,/ \/\\ \\/ ,-_- | |
| | |-|
|-| > AWS Full Stackin’ w/ aaS - by @zuphzuph | |
| | |-|
|-| > Exploiting Automation in LTE Mobile Networks | |
| | |-|
|-| | |
| | |-|
|-| | |
|_|__________________________________________________________________________| |
(@) l /\ / ( ( \ /\ l `\|-|
l / V \ \ V \ l (@)
l/ _) )_ \I
`\ /'
`
_______________________________________________________________________
()=( (@==()
'______________________________________________________________________'|
| |
| _-_, , |
| // || ; ' ; |
| || \\/\\ =||= _-_ ,._-_ \\/\ \\ _-_ \\/\/\ |
| ~|| || || || || \\ || || | || || \\ || | | |
| || || || || ||/ || || | || ||/ || | | |
| _-_, \\ \\ \\, \\,/ \\, \\/ \\ \\,/ \\/\\/ |
| |
| \'/ |
| -= * =- Speaking With A Level 50 Infosec Mage |
| .-"-. / #,_ Georgia Weidman |
| / /\_ \ `#|\ |
| / /')'\ \ /#/ |
| ( \ = / )/\/# > Author - Penetration Testing: A Hands-On |
| ) ) ( (/ \ Introduction to Hacking |
| (_.;`"`;._) | |
| / ( \|/ ) | Areas of Expertise: |
| / /\-'^'-/\ | > Pentesting |
| | \| )=@=( \_/ > Mobile Security |
| | /\/ \ > IoT Security |
| | /\ \ ; > Running a Business |
| \(// /' | |
| \/ | |
| | / / Projects: |
| | ___/\_\ > Bulb Security |
| |/ / \ \| > Shevirah Inc. |
| / | | | | \ > Upcoming Book |
| \_|/ \|_/ |
| / \`-'/ \ |
| `-' '-` |
| |
| |
| |
| |
| |
| |
| Contact: |
| Twitter - @georgiaweidman |
| |
_)______________________________________________________________________|
()=( (@==()
'----------------------------------------------------------------------'
Play for Aesthetic
PREV || NEXT