Yong il Lee

@201_102

CEO @ Diffense

Seoul
Vrijeme pridruživanja: travanj 2010.

Tweetovi

Blokirali ste korisnika/cu @201_102

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @201_102

  1. 8. kol 2019.

    Automated process to find DACL-rewrite bugs 1) obtain every target path of "SetSecurity" calls via procmon 2) replace the path with symlink or hardlink 3) run applications from system app list 4) do random ui interaction 5) check if dacl changed

    Poništi
  2. 8. kol 2019.

    Overwriting one of function pointers in DNS Client API to inject payload into target process.

    Poništi
  3. 8. kol 2019.

    summary on attacking rdp client 1) clipboard synced between server and client 2) can sniff the contents of client's clipboard on server side 3) manipulating clipboard on server side lead to arbitrary file copy 4) hyper-v use rdp so it could be vulnerable

    Poništi
  4. 29. srp 2019.
    Poništi
  5. 11. srp 2019.

    Firefox 1day full chain exploit demo by Diffense, exploiting two vulnerabilities(CVE-2019-11707, CVE-2019-11807) which were used in targeted attacks against cryptocurrency firms

    Poništi
  6. proslijedio/la je Tweet
    11. ožu 2019.

    we are excited to announce that we added support in Windows Kernel to run DTrace. DTrace is now officially supported on Windows 10! Full details on how to use DTrace on Insider builds, along with links to GitHub to our source code. cc

    Poništi
  7. proslijedio/la je Tweet
    26. stu 2018.

    I made a poster of Doug Lea's malloc() implementation while I was studying its vuln. If you want it you can have it :) Also added some references in a blog post:

    Poništi
  8. proslijedio/la je Tweet
    31. lis 2018.

    Jok3r - Network and Web Pentest Framework Very good tool. Thank you "main goal is to save time on everything that can be automated during network/web pentest in order to enjoy more time on more interesting and challenging stuff."

    Poništi
  9. proslijedio/la je Tweet

    One thing I like about attacking antivirus software is that it architecturally includes every conceivable attack vector. You have format parsing (as SYSTEM, obv.), COM/OLE, ActiveX and varios browser extensions, kernel modules with IOCTL, filter drivers, MitM via updates, IPC...

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. lis 2018.

    Sandboxing is now available for Windows Defender (opt-in for now)! Tons of credit to the team for their work on this (it wasn't easy), and thanks to , , and other researchers who have helped make Defender even more secure

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    12. kol 2018.

    The DEF CON presentations and other media files are available on the conference's website at:

    Poništi
  12. proslijedio/la je Tweet
    28. srp 2018.

    How to NOT have use-after-free pt 1 Avoid using free() at all

    Poništi
  13. 14. ožu 2018.

    LIEF - a cross platform library which can parse, modify and abstract ELF, PE and MachO formats.

    Poništi
  14. proslijedio/la je Tweet

    Google gives anyone with Gmail account a free Debian 7 VM with 5Gb of storage.

    Poništi
  15. proslijedio/la je Tweet

    Making some progress with for IDA 7. Still lots of stuff to do, though.

    Poništi
  16. proslijedio/la je Tweet
    2. velj 2018.

    Great Windows Defender engine RE talk by atv

    Poništi
  17. 19. ruj 2017.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·