possible.lv

possible.lv

@possiblelv

IT security consulting, penetration testing. Security research, hardware.

EU · possible.lv

Tweets

  1. it *is* valid before 0day. your provider issued a retrospective cert. this doesn't make it insecure, simply "valid before".

  2. there's nothing we can do about that, since SSL cert does not carry such info. should not be issuing predated certs.

  3. tentatively added additional tests simulating different versions. can we have the domain now?

  4. I think already has done that before disclosure date b/c they knew about the vuln. before.

  5. How to be safe as a user? 1. Check server 2. When server patched and cert reissued, change your password.

  6. Retweetet von

    that's because EDUs never patch their servers ;) We got lucky this time running old OpenSSLs

  7. It tries to fully negotiate the ext first. If it succeeds, it runs separate tests for different vuln. flavors.

  8. You are correct, extension negotiation is a prerequisite for the following tests. What use case do you envision?

  9. Retweetet von

    Here we see some bay area sysadmins dealing with the Heartbleed issue.

  10. That was the original idea as no fixed userland packages were available. Now updated to actually test the bug.

  11. Check if you are possibly affected by the heartbleed CVE-2014-0160 bug now: Upgrade ASAP!

  12. Uzmanību! Šis konts nav īsts!! -> “: Jaunumi un informācija, bites izmantošanā.”

Das Laden scheint etwas zu dauern.

Twitter ist möglicherweise überlastet oder hat einen vorübergehenden Schlucklauf. Probiere es erneut oder besuche Twitter Status für weitere Informationen.