Souhail Hammou

@Dark_Puzzle

Reverse Engineering - Windows Internals - Malware Analysis - Vulnerability Research - Malware Reverse Engineer at Intel 471

Morocco
Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @Dark_Puzzle

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dark_Puzzle

  1. Prikvačeni tweet
    15. sij 2018.

    We're so excited to launch our own CTF platform ! You can register and start playing at : Happy reversing !

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  3. 24. sij

    A project using a privilege escalation I found almost two years ago in MalwareFox ! Cool !

    Tweet je nedostupan.
    Poništi
  4. proslijedio/la je Tweet
    4. sij
    Poništi
  5. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  6. proslijedio/la je Tweet
    5. pro 2019.

    CVE-2019-12750 Symantec Local Priv Esc: walks you through the exploitation of Symantec Endpoint Protection.

    Poništi
  7. proslijedio/la je Tweet
    11. lis 2019.

    The hall-of-fame for 2019 is live:

    Poništi
  8. 4. lis 2019.

    1. First language: x86 Assembly 2. Had difficulties: C++ 3. Most used: C 4. Totally hate: Java 5. Most loved: C 6. For beginners: Python

    Poništi
  9. 25. kol 2019.

    Flare-on completed : 28th position ! Wasted a lot of time on L12 while the answer was hidden in plain sight, I should have kept things simple. Anyway, any suggestions for what I should do with my life now ?

    Poništi
  10. 23. kol 2019.
    Poništi
  11. 22. kol 2019.

    Level 10 done ! I managed to solve it without relying on the 2nd GIF, I still can't figure out why it's there !!

    Poništi
  12. 22. kol 2019.
    Poništi
  13. proslijedio/la je Tweet
    17. kol 2019.

    Finally a crash in kernel PE Loader by a malformed PE header.

    Poništi
  14. 13. kol 2019.

    Comodo Antivirus - Sandbox Race Condition Use-After-Free (CVE-2019-14694) :

    Poništi
  15. 3. kol 2019.

    Taking a short break...

    Poništi
  16. proslijedio/la je Tweet
    22. srp 2019.

    Here's a Sandbox Escape + Local Privilege Escalation found I found in Comodo Antivirus (CVE-2019–3969). Features signed binary bypass, crashing services, and some COM.

    Poništi
  17. 19. lip 2019.

    Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver the right way, by using the symbol server :

    Poništi
  18. proslijedio/la je Tweet
    17. lip 2019.

    Mark your calendars. (17 Aug 2019 00:00 UTC)

    Poništi
  19. proslijedio/la je Tweet
    10. lip 2019.

    Windows Boot Process

    Poništi
  20. proslijedio/la je Tweet
    6. lip 2019.

    Guys, I just published a blog post about "Why you should not always trust MSDN" and described how ACCESS_MASK is contrary to the documentation. It ends with an IDA Python script that dumps ACCESS_MASK needed by handles in Windows kernel.

    Poništi
  21. 14. svi 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·