Pietro Oliva

@0xsysenter

Security researcher. Exploit developer. Reverse engineer. Red teamer. Pentester. Software developer.

Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @0xsysenter

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xsysenter

  1. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  3. proslijedio/la je Tweet

    Taking a look at what we published in 2019. What was the most popular vendor? The most common ? All this and more in our 2019 retrospective.

    Poništi
  4. proslijedio/la je Tweet
    29. sij
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    23. sij

    New blog post: The Life of a Bad Security Fix: We'll do more shorter-form blogs like this rather than just tweet into the void over several months about the journeys of bad fixes:

    Poništi
  12. proslijedio/la je Tweet

    Nobody tell about how exploits work, the million dollar exploit market, and billion dollar surveillance industry.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Learn to write your first OS kernel (minimalist kernel) : Kernels 101 – Let’s write a Kernel : cc

    Poništi
  16. proslijedio/la je Tweet
    22. sij

    Insufficient fix for CVE-2019-6205 means XNU vm_map_copy optimization which requires atomicity still isn't atomic

    Poništi
  17. proslijedio/la je Tweet
    19. sij

    Someone asked me about this . So yeah, tcache has checks for those (trivial...) incorrect behaviors now on Ubuntu. BUT - my Android 10 is still vulnerable (left is Ubuntu 19.10, right is Android 10)

    Poništi
  18. proslijedio/la je Tweet
    19. sij
    Poništi
  19. proslijedio/la je Tweet
    18. sij

    Very helpful design principles for zero-trust network architectures (aka BeyondCorp, BeyondProd) from UK :

    Poništi
  20. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·