Tris

@0xtris

Low level programming and exploitation

Vrijeme pridruživanja: siječanj 2019.

Tweetovi

Blokirali ste korisnika/cu @0xtris

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xtris

  1. proslijedio/la je Tweet
    15. sij

    Late to the party but yeah, confirmed this bug can indeed be used to fake signature of any ECDSA intermediate CA. Left side is an unpatched VM. Didn't bother filling all those strange x509 extension fields required by modern browsers so no fancy in browser screenshot.

    Poništi
  2. 31. pro 2019.

    3/3 thanks a lot for challenges you gave me. Arm assembly gave me a new perspective and encouraged me to dive into binary exploitation.

    Prikaži ovu nit
    Poništi
  3. 31. pro 2019.

    2/3 I was able to attend my second . Learned a lot and made new friends.Thanks all people involved in making it a success.

    Prikaži ovu nit
    Poništi
  4. 31. pro 2019.

    1/3 balancing my undergraduate and infosec degree has been tough and rewarding. But now I can focus all my energy in infosec after 2020 January. I will now have enough time to do educational stuff.

    Prikaži ovu nit
    Poništi
  5. 31. pro 2019.

    2019 has been both a tough year and rewarding year too. I was able to make some strives in my infosec journey. Thanks all people who have been there for advice, encouragement and motivation.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    12. pro 2019.

    Check out this tech talk I gave to on Reverse Engineering Ransomware. This makes a great introduction to malware analysis.

    Poništi
  7. proslijedio/la je Tweet
    8. pro 2019.
    Odgovor korisnicima
    Poništi
  8. proslijedio/la je Tweet
    6. pro 2019.

    Looking to hire a strong C dev and Reverse engineer with knowledge of Linux internals and a deep understanding of ELF voodoo & Leadership skills. Message me for more details. if you know a possible fit please let me know.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    5. pro 2019.

    Remember that video about how block collisions can compute the digits of pi? A friend, Adam Brown, just showed that the math underlying this is actually identical to the math behind a very famous quantum search algorithm (Grover's): Genuinely crazy!

    Poništi
  10. proslijedio/la je Tweet
    2. pro 2019.

    The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .

    Poništi
  11. 27. stu 2019.

    Need help to understand this output by mtrace?

    Poništi
  12. 27. stu 2019.

    Complex analysis {contour integration} making me scratch my head.

    Poništi
  13. 14. stu 2019.

    How can I circumvent ptrace of a binary, whose ptrace function is implemented at runtime in memory. Writing fake shared library for ptrace or setting my shared library as environment variable in LD_PRELOAD does not help .Any help?

    Poništi
  14. proslijedio/la je Tweet
    8. stu 2019.

    What I found interesting 1/3: Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 With some overview and deep dive into several real exploits. Including , SMAP, exploiting races. 1/3

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. stu 2019.

    I wrote the 2nd tutorial for my kernel exploit series: bypassing SMEP/KPTI via kernel ROP.

    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.

    Finally had some time to write about the autochk rootkit Nothing too fancy, but I do think it's nice :) The rootkit redirects hidden files and hides network connections. It's signed by a chinese company. I reconstructed the full source code just for fun;)

    Poništi
  17. proslijedio/la je Tweet
    1. stu 2019.

    New Blog Post: Hancitor + COM Objects Recently, Hancitor incorporated the use of COM to spawn IE and download stage 2 payloads. While many may have not understood the true risk of what the Hancitor campaign stumbled into it, its very dangerous.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. lis 2019.

    I just published an in-depth analysis of how the network protocol works. Also I've released a tool which emulated this protocol and is capable to download new & from the C&Cs. It's integrated with and .

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    14. lis 2019.

    I've publish the challenges I made for HITCON CTF 2019 Quals ( EmojiVMs, Core Dumb ) , including source code & solutions: ( More like a blog post on github :P ) Hope you guys had fun solving my challenges :)

    Poništi
  20. proslijedio/la je Tweet

    Tool: Offline command line lookup utility for GTFOBin by -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·