DPR3

@D0C_H0LL1D4Y

exploit dev, comp sec research

Vrijeme pridruživanja: listopad 2014.

Tweetovi

Blokirali ste korisnika/cu @D0C_H0LL1D4Y

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @D0C_H0LL1D4Y

  1. proslijedio/la je Tweet
    4. velj

    I recently left my position and I'm looking for consulting work. (Not looking for a full-time position.) Particularly interested in low-level security and development work, e.g. code audits, reverse engineering, exploit mitigations, LLVM development, etc.

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    In those CET times: It's possible to return in unwinding to any address in the SSP, causing a "type confusion" between stack frames ;) I really like the different variants of this concept :) Type confusions are on fire! (stack frames, objc for PAC bypass)

    Poništi
  3. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. pro 2019.
    Poništi
  5. proslijedio/la je Tweet

    Huge weekend ahead for VIPs. tonight. Big play tomorrow then we cash Sunday with . Going for +30U this week 🔥🔥 Dm to grab a package and start cashing 💰💰💰

    Poništi
  6. 11. pro 2019.

    Yet another great vuln by CVE-2019-19726. wideOpenBSD local root

    Poništi
  7. 2. pro 2019.

    Did I really just forget my LUKS password? 😩

    Poništi
  8. proslijedio/la je Tweet
    23. stu 2019.

    An amazing video about "Arbitrary Code Execution in Zelda Ocarina of Time". Also great editing to show the complex memory interactions!

    Poništi
  9. proslijedio/la je Tweet
    21. stu 2019.

    Maersk didn't have a single backup up their 100 global domain controllers. Designed to backup to each other, they could lose 1 or 25 DCs & be fine. They just couldn't lose all of them. Miraculously, said at , a serendipitous blackout in Ghana saved 1 DC.

    Poništi
  10. proslijedio/la je Tweet
    16. stu 2019.

    I've just written a performant in-memory fuzzing module with for AFL++ . Watch AFL++ on GH and stay tuned for a frida_mode in the next days!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    8. stu 2019.

    What I found interesting 1/3: Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 With some overview and deep dive into several real exploits. Including , SMAP, exploiting races. 1/3

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    6. stu 2019.

    A random bit of trivia I remembered recently. Got a DOS box with a password protected BIOS and no tools handy? Corrupt CMOS checksum with this simple command and get inside after reboot: echo “dummy” > CLOCK$

    Poništi
  13. proslijedio/la je Tweet
    30. lis 2019.

    Static analysis to determine object sizes allocated by various syscalls to perform kernel SLAB/SLUB layout manipulation, enabling exploitation. 30 new N-day exploits coming, abstract includes link to a sample set of exploits.

    Tweet je nedostupan.
    Poništi
  14. 21. lis 2019.

    Anyone know if IDA Pro sends all binaries to a remote server to help with “improvements” for future releases?

    Poništi
  15. proslijedio/la je Tweet
    3. lis 2019.

    Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    1. lis 2019.

    geohot is back - just for checkm8:

    Poništi
  18. proslijedio/la je Tweet
    17. ruj 2019.

    Apparently Apple kernel 0day (I don’t have a test machine for Apple). thread_set_state() is called on current thread (illegal according to docs) in 32bit process with all registers set to 0xffffffff other than gs=23. Exploit bypasses SMEP

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. ruj 2019.

    cursed regex (1,253,604 chars long)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. ruj 2019.
    Odgovor korisnicima

    Add NT API’s grammars to Domato, then use engine to run generated Code via chakra. CC

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·