David Wells

@CE2Wells

Zero Day Research at

California, USA
Vrijeme pridruživanja: listopad 2018.

Tweetovi

Blokirali ste korisnika/cu @CE2Wells

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CE2Wells

  1. Prikvačeni tweet
    4. ruj 2019.

    I found a Kernel write-what-where/LPE in Qualcomm driver for Windows. Apparently Qualcomm had a fix but it wasn't distributed through latest driver update means.

    Poništi
  2. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    How every correlation study sounds

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Managed to pair up a rogue keypad to a SimpliSafe SS3 alarm system and disarm it. There are some limitations to the attack, but it was still fun. PoC video is in the research advisory.

    Poništi
  5. 13. sij

    Fantastic reverse engineer here that you should follow-> Discord research was NOT my project, we worked together everystep of the way.

    Poništi
  6. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  7. proslijedio/la je Tweet
    17. pro 2019.

    This is one of the most cursed things I've ever seen: $ python2 >>> import string >>> string.letters 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' >>> help(string) >>> string.letters 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    12. pro 2019.

    Did some scanning of port 8291. Of the 500,000+ RouterOS devices found, only ~15% had patched since my October disclosure. Details and dataset within:

    Poništi
  9. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  10. proslijedio/la je Tweet

    discovered multiple buffer overflow vulnerabilities that can be triggered via a crafted HTTP request. An authenticated attacker may exploit these to execute code remotely.

    Poništi
  11. proslijedio/la je Tweet
    13. stu 2019.

    Another win32k pointer leak, this time it's more fun :) Enjoy:

    Poništi
  12. proslijedio/la je Tweet
    6. stu 2019.

    Just observed CVE-2019-3978 in the wild. Upgrade your RouterOS or disable Winbox.

    Poništi
  13. proslijedio/la je Tweet
    31. lis 2019.

    Windows 95 security was lit

    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    From unauthenticated Winbox access to root console. Patch your RouterOS installs:

    Poništi
  15. proslijedio/la je Tweet
    25. lis 2019.

    It doesn't look like it on the schedule but I promise I'm presenting on Sunday 😆 Tenable ICS Vulnerabilities - Sunday @ 9 am in Track 3

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. 11. lis 2019.

    Hey all , if anyone interested in Windows internals, exploitation, or vuln hunting. Come check out my talk this Saturday at 3:30pm - COModo : Sandbox to SYSTEM

    Poništi
  18. proslijedio/la je Tweet
    8. lis 2019.

    Starting with the telemetry data gathered by ESET’s scanner, machine learning specialists and malware researchers devised a method to spot rare UEFI/based .

    Poništi
  19. proslijedio/la je Tweet
    2. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    1. lis 2019.

    Tenable research found HPE iMC to have an inadequate patch that opens up RCE. Let's take a look.

    Poništi
  21. proslijedio/la je Tweet
    25. ruj 2019.

    Written a new blog in my Windows Exploitation Tricks series, how to spoof the named pipe client PID.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·