Croulder

@Crocro2011

A Corunha
Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @Crocro2011

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Crocro2011

  1. proslijedio/la je Tweet
    23. sij

    Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  4. proslijedio/la je Tweet
    13. sij

    Google hackers successfully use remote exploit to hack iPhone

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Citrix ADC/Netscaler RCE (CVE-2019-19781) 😬

    Poništi
  6. proslijedio/la je Tweet

    Linux: privilege escalation via io_uring offload of sendmsg() onto kernel thread with kernel creds

    Poništi
  7. proslijedio/la je Tweet
    26. stu 2019.

    Unlink heap exploitation was introduced in the year 2000 by Solar Designer as the first generic heap exploitation technique. It's been mitigated in glibc and most allocators for 15+ years. Think it's dead? Not in modern day uClibc by

    Poništi
  8. proslijedio/la je Tweet

    Linux vs Windows update meme for you.

    Poništi
  9. proslijedio/la je Tweet
    15. stu 2019.

    This is literally just, like, a hundred Chinese security researchers testing their 0days in competition against modern software targets. It is probably the densest collection of 0days per sqm in the world, and I’ve seen only one organic tweet about it. Infosec Twitter, wtf?!?

    Poništi
  10. proslijedio/la je Tweet

    Lmao. Truth always hurts. Via

    Poništi
  11. proslijedio/la je Tweet
    24. ruj 2019.
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    Imperva Breach Exposes WAF Customers' Data, Including SSL Certs, API Keys

    Poništi
  13. proslijedio/la je Tweet
    22. ruj 2019.

    "En general, los hombres juzgan más por los ojos que por la inteligencia, pues todos pueden ver, pero pocos comprenden lo que ven". Nicolás Maquiavelo.

    Poništi
  14. proslijedio/la je Tweet
    6. ruj 2019.
    Poništi
  15. proslijedio/la je Tweet
    4. ruj 2019.

    I found a Kernel write-what-where/LPE in Qualcomm driver for Windows. Apparently Qualcomm had a fix but it wasn't distributed through latest driver update means.

    Poništi
  16. proslijedio/la je Tweet
    4. ruj 2019.

    RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

    Poništi
  17. proslijedio/la je Tweet
    4. ruj 2019.

    Discovered this today while going down a rabbit hole: "Deploy-Application.EXE is a small EXE file which basically invokes the PowerShell script....."

    Poništi
  18. proslijedio/la je Tweet

    Fortigate are calling this issue in FortiOS a “vulnerability” but to be clear it’s actually a major backdoor. The backdoor code is flat out there in the OS, it even needs a ‘secret’ code typed to trigger it. How did a major firewall vendor (almost 500k IPs) end up backdoored?

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Do not allow people to kill the ideas that you genuinely care about

    Poništi
  20. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·