Turtle Girl  

@7ur7l3_61rl

InfoSec noob, main platform Linux, programmer C/C++, hoping to learn reverse engineering & exploit dev. Likes gifs a bit too much 🐢 Pronouns: her/she

Vrijeme pridruživanja: svibanj 2017.

Tweetovi

Blokirali ste korisnika/cu @7ur7l3_61rl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @7ur7l3_61rl

  1. Prikvačeni tweet

    This thread will be a list of things I want to learn and do by the end of 2019.

    Prikaži ovu nit
    Poništi
  2. 7. sij

    It’s surprisingly annoying how close I’ve been to so much of this 😂 I need to think up a new list for 2020...

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. stu 2019.
    Odgovor korisniku/ci

    has challenges dedicated to rop. picoctf19 has a basic, rop64. guess there are more easy, stack based for real ones,but I only recall this very detailed write up on a heap vuln, but it's really nice to reimplement!:

    Poništi
  4. I’m starting to consider going to 64 bit as a “raising the bar” mitigation 😂

    Poništi
  5. Anyone know of any real ROP examples on 64 bit? Or a nice CTF exercise?

    Prikaži ovu nit
    Poništi
  6. This one was harder than I thought... much easier on 32 bit if you need to avoid null bytes... 😞

    Prikaži ovu nit
    Poništi
  7. I’m doing ok, but I’m running out of time 😅

    Poništi
  8. proslijedio/la je Tweet
    9. srp 2019.

    My Pwn2Own Firefox sbx escape got fixed: Language packs could be installed without user interaction via the AddonManager API, and this allowed for trivial XUL injection in the Chrome process (unsandboxed parent)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. srp 2019.

    The first step of researching iMessage is bricking your phone by mistake:

    Poništi
  10. proslijedio/la je Tweet
    19. svi 2019.

    The start of a new series. We will try to learn some basics about browser exploitation. Specifically we will look at JavaScriptCore - the JavaScript engine from WebKit.

    Poništi
  11. proslijedio/la je Tweet
    13. svi 2019.

    I guess I know there’s at least two people now ...

    Poništi
  12. proslijedio/la je Tweet
    29. tra 2019.

    It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop.

    Screenshot of front page of the Android app reversing workshop.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. tra 2019.
    Odgovor korisnicima

    Finding instability is the same as finding a weird *state* though; whether you can prevent the wheels from falling off the weird machine you get is a different question. Also remember: The weird machine *need not* be turing complete to be useful.

    Poništi
  14. proslijedio/la je Tweet
    18. tra 2019.

    Feeling adventurous? Another exploit challenge has escaped from our servers. To support ecosystem diversity, the first woman/female-identifying solver will win a FREE seat to our browser exploitation training in June! Click here to play:

    Poništi
  15. proslijedio/la je Tweet

    so challenged me to do a thing: there's a bash one-liner that: - pulls vulnerable weblogic boxes out of shodan - nmaps port 7001 to make sure its open - hands that list to xargs across 50 threads hack/mod/chop whatevs happy hunting!

    Poništi
  16. proslijedio/la je Tweet

    Hello everyone 📚 I would like to learn a new programming language. Which language is best suited for a new professional like myself ? Please reply with other suggestions. RT for reach, thank's all 🖥 !

    Poništi
  17. Speaking of, which conferences have been the best for exploit development talks?

    Poništi
  18. I’m working on watching 18 years of exploit development talks on YouTube... I really love the internet 😍

    Poništi
  19. proslijedio/la je Tweet
    18. tra 2019.
    Odgovor korisnicima

    Hello, you might also find Sotirov's 2007 Heap Feng Shui paper on constructing a weird machine (w non-crashing weird states) helpful

    Poništi
  20. proslijedio/la je Tweet
    18. tra 2019.
    Odgovor korisnicima

    Longer discussion of my criticism of the term "Turing complete" for exploitation here: It is true that once you get two weird machines of the "anything can happen" variety, they are isomorphic to some extent, but most of them are special snowflakes.

    Poništi
  21. TFW you are intimidated by the folks in your mentions so you’re afraid to like anyone’s tweets 😳 what if the other person gets upset at the wrong like? 🙈

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·