Tweetovi

Blokirali ste korisnika/cu @BrunoPujos

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BrunoPujos

  1. proslijedio/la je Tweet
    20. sij
    Odgovor korisnicima

    Our publication was noticed by who reported the bug to Lenovo in May 2019. It was tracked under CVE-2019-6170 and patched in August 2019. Our blogpost was updated accordingly!

    Poništi
  2. proslijedio/la je Tweet
    14. sij
    Poništi
  3. proslijedio/la je Tweet
    14. lis 2019.

    From tweet to rootkit, our analysis by of a signed rootkit highlighted by : [EN] [FR]

    Poništi
  4. proslijedio/la je Tweet
    4. ruj 2019.

    Decrypting the firmware of Yealink VoIP phones. A tale about xor and cleartext attacks:

    Poništi
  5. proslijedio/la je Tweet
    18. pro 2018.

    Fifty shades of UEFI: an initiation to SMM practices

    Poništi
  6. proslijedio/la je Tweet
    11. pro 2018.

    Kinibi TEE: reaching arbitrary code execution in a Trusted App

    Poništi
  7. proslijedio/la je Tweet
    22. stu 2018.

    Slides of our talk at are available … HPE iLO5 secure boot has been defeated, and there seems to be no way to revoke existing vulnerable signed elements!

    Poništi
  8. proslijedio/la je Tweet
    4. srp 2018.

    Slides of talk at : From corrupted memory dump to rootkit detection.

    Poništi
  9. proslijedio/la je Tweet
    15. lip 2018.

    For the COM lovers - My analysis of CVE-2018-0624 with POC :-)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    29. svi 2018.

    CET is coming in RS5 ;-) XSTATE_CET_U (11) XSTATE_MASK_CET_U (1ui64 << (XSTATE_CET_U))

    Poništi
  11. proslijedio/la je Tweet
    30. svi 2018.

    New technical write-up by on how to perform a DMA attack against a Windows 10 workstation (TPM-only BitLocker)

    Poništi
  12. proslijedio/la je Tweet
    25. ožu 2018.

    New blog post - UEFI Ninja! Walks through a bit of work I did on UEFI and how I used to find protocols defined elsewhere in a firmware image.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    8. ožu 2018.

    COM interception with CoGetInterceptor recently described by is pretty neat. I made a full Python POC that intercepts calls to the Firewall (INetFwPolicy2) !

    Poništi
  14. proslijedio/la je Tweet
    12. velj 2018.

    REcon BRX 2018 Slides are here !!

    Poništi
  15. proslijedio/la je Tweet
    8. velj 2018.

    Detection and analysis of Uroburos's kernel backdoor in 2017 : 64b rootkits are not deads ! cc

    Poništi
  16. proslijedio/la je Tweet
    7. velj 2018.

    All details of our talk on HP iLO during is online now. Big up and Alex Gazet

    Poništi
  17. proslijedio/la je Tweet
    5. sij 2018.

    New ninjas in the Synacktiv team! Let's hack 2018 with & Vincent!

    Poništi
  18. proslijedio/la je Tweet
    6. pro 2017.
    Poništi
  19. proslijedio/la je Tweet
    9. stu 2017.
    Poništi
  20. proslijedio/la je Tweet
    20. stu 2017.

    the Apocalypse begins: Multiple buffer overflows in Intel CSME including with remote vector

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·