Tweetovi

Blokirali ste korisnika/cu @4nhdaden

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @4nhdaden

  1. proslijedio/la je Tweet

    Start off the week with the 2nd part of 's look into reversing a TP-Link TL-WR841N wireless router. His write-up includes a full exploit & a video demonstration of ZDI-19-992.

    Poništi
  2. proslijedio/la je Tweet
    22. stu 2019.

    my writeup for finding bugs in Linksys Velop. 4 bugs found: 3 critical without authentication, 1 info leak.

    Poništi
  3. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    16. stu 2019.

    Two successful RCE demonstrations today on PDF Reader are from Bit-STARLabs and StackLeader . Tomorrow the attempts on Adobe will continue, we will know the final bonus distribution by then.

    Poništi
  5. proslijedio/la je Tweet
    20. lis 2019.

    Container escape revisit in The first one is here: https://hackerone[.]com/reports/694181

    Poništi
  6. 16. lis 2019.

    Lucky me, it’s still survive the update this morning 😄

    Poništi
  7. 15. lis 2019.
    Poništi
  8. proslijedio/la je Tweet
    13. lis 2019.

    9 🇻🇳 𝚙𝚠𝚗𝙿𝙷𝙾𝚏𝚞𝚗 with my awesome teammates

    Poništi
  9. proslijedio/la je Tweet
    28. ruj 2019.

    Am I the only one did the last challenge by cracking KeePass. Thanks and for another great contest 👏👏👏 Cant wait for the awesome medal.

    Poništi
  10. proslijedio/la je Tweet
    12. ruj 2019.

    I magnaged to convert into a linear heap overflow and wrote an exploit for it without an info leak bug.

    Poništi
  11. 27. tra 2019.
    Poništi
  12. proslijedio/la je Tweet

    Confirmed! used an integer underflow in the VirtualBox client to pop calc at medium integrity on the host OS. He earned himself $35,000 USD and 3 Master of Pwn points.

    Poništi
  13. proslijedio/la je Tweet

    This is the story of how we found a 19 year old Code Execution vulnerability in WinRAR

    Poništi
  14. proslijedio/la je Tweet
    31. sij 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. sij 2019.

    Thank you for this post.. I was struggling since 2 days to run on .... I appreciate a lot as you have mentioned everything in detail including the issues you faced and their solutions 😇

    Poništi
  16. proslijedio/la je Tweet
    2. sij 2019.

    # Best New Year gift for myself :) VM escape again! This time it's qemu. Both guest and host are Ubuntu 18.04.1 with the default configuration of qemu. I exploited it with a single bug. If it's possible, I'll release the exploit and details after the fixing.

    Poništi
  17. proslijedio/la je Tweet
    27. pro 2018.

    IDA Python script for cross-referencing constants against the Magic Number Database ():

    Poništi
  18. proslijedio/la je Tweet

    When 1 corruption is not enough. breaks down a winning Reader PDF exploit from . Read the full analysis at

    Poništi
  19. 23. lis 2018.

    Virtualbox 6.0 now support nested vm with [--nested-hw-virt on|off] option?

    Poništi
  20. 12. lis 2018.

    Just tested with the latest official release build. The guest still survive, yay :D

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·