Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xtris
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xtris
-
Tris proslijedio/la je Tweet
Late to the party but yeah, confirmed this bug can indeed be used to fake signature of any ECDSA intermediate CA. Left side is an unpatched VM. Didn't bother filling all those strange x509 extension fields required by modern browsers so no fancy in browser screenshot.pic.twitter.com/Q9oFeajaWz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
3/3
@xtian_kisutsa thanks a lot for challenges you gave me. Arm assembly gave me a new perspective and encouraged me to dive into binary exploitation.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
2/3 I was able to attend my second
@AfricaHackon . Learned a lot and made new friends.Thanks all people involved in making it a success.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
1/3 balancing my undergraduate and infosec degree has been tough and rewarding. But now I can focus all my energy in infosec after 2020 January. I will now have enough time to do educational stuff.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
2019 has been both a tough year and rewarding year too. I was able to make some strives in my infosec journey. Thanks all people who have been there for advice, encouragement and motivation.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
Check out this tech talk I gave to
@JaneStreetGroup on Reverse Engineering Ransomware. This makes a great introduction to malware analysis.https://www.youtube.com/watch?v=gjCKKLuDoP8 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
For books I have high hopes for “Modern C” which should be out shortly:https://www.amazon.com/Modern-C-Jens-Gustedt/dp/1617295817/ref=mp_s_a_1_1?keywords=modern+c&qid=1575823475&sr=8-1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
Looking to hire a strong C dev and Reverse engineer with knowledge of Linux internals and a deep understanding of ELF voodoo & Leadership skills. Message me for more details.
@ulexec@silviocesare@emdel if you know a possible fit please let me know.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
Remember that video about how block collisions can compute the digits of pi? A friend, Adam Brown, just showed that the math underlying this is actually identical to the math behind a very famous quantum search algorithm (Grover's): https://arxiv.org/abs/1912.02207 Genuinely crazy!pic.twitter.com/mZKx7gnLQv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
The slides of our talk "Pool Fengshui in Windows
#RDP Vulnerability Exploitation" at#bluehatseattle are available. https://github.com/ga1ois/BlueHat-2019-Seattle … Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708#bluekeep.pic.twitter.com/4ny08Ba4TL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Complex analysis {contour integration} making me scratch my head.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
How can I circumvent ptrace of a binary, whose ptrace function is implemented at runtime in memory. Writing fake shared library for ptrace or setting my shared library as environment variable in LD_PRELOAD does not help .Any help?
#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
What I found interesting 1/3: Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 https://www.youtube.com/watch?v=MYEAGmP_id4 … With some overview and deep dive into several real exploits. Including
#bpf, SMAP, exploiting races. 1/3https://twitter.com/LinuxSecSummit/status/1192601742854119424 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
I wrote the 2nd tutorial for my kernel exploit series: bypassing SMEP/KPTI via kernel ROP.https://github.com/pr0cf5/kernel-exploit-practice/tree/master/bypass-smep …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
Finally had some time to write about the autochk rootkit Nothing too fancy, but I do think it's nice :) The rootkit redirects hidden files and hides network connections. It's signed by a chinese company. I reconstructed the full source code just for fun;) https://repnz.github.io/posts/autochk-rootkit-analysis/ …pic.twitter.com/MyoF8dR8Be
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
New Blog Post: Hancitor + COM Objects Recently, Hancitor incorporated the use of COM to spawn IE and download stage 2 payloads. While many may have not understood the true risk of what the Hancitor campaign stumbled into it, its very dangerous.https://www.dodgethissecurity.com/2019/11/01/hancitor-evasive-new-waves-and-how-com-objects-can-use-cached-credentials-for-proxy-authentication/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
I just published an in-depth analysis of how the
#Emotet network protocol works. Also I've released a tool which emulated this protocol and is capable to download new#modules &#malware from the C&Cs. It's integrated with@hatching_io and@CapeSandbox. https://d00rt.github.io/emotet_network_protocol/ …pic.twitter.com/BTogCwsJqn
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
I've publish the challenges I made for HITCON CTF 2019 Quals ( EmojiVMs, Core Dumb ) , including source code & solutions: https://github.com/bruce30262/CTF_challenge_public/tree/master/hitcon2019_qual … ( More like a blog post on github :P ) Hope you guys had fun solving my challenges :)
#hitconctfHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Tris proslijedio/la je Tweet
Tool: Offline command line lookup utility for GTFOBin by
@JamesConlan96 -https://github.com/nccgroup/GTFOBLookup …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.