EiP.P4ssenger

@EiPP4ssenger

Security Researcher,Bug hunter,C++.

xyz
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @EiPP4ssenger

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EiPP4ssenger

  1. proslijedio/la je Tweet

    Oh, look, another awful vulnerability in a HiSilicon provided BSP for DVRs:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Last year, researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device. IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard.

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    HEVD -- Arbitrary Write, Win7 x64 Some weird, possibly self-induced, behavior on this one. Had to deal with a consistent overwrite of our first two shellcode buffer bytes. But we adapted and made it work. Let me know if you can provide clarity!

    Poništi
  6. proslijedio/la je Tweet
    31. sij
    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    After a long break, the third post in the series has been published! We will see how helps with the of restricted instructions and how allows for the implementation of handlers for them. Have a nice read.

    Poništi
  13. proslijedio/la je Tweet
    17. pro 2019.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    5. svi 2019.

    Nice writeup+(0x41414141) PoC for Mozilla Firefox HTML5 Stream Parsing Use-after-free Vulnerability (CVE-2018-18500) by Yaniv Frank from :

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    How to use the Fuzz tool WinAFL—fuzzing the FreeImage image analysis library #

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    in-memory traces of ppldump, exploiting zam64.sys vulndriver to dump lsass memory, cool stuff. sysmon will show a generic\noisy calltrace so detection chances here are low, if combined with lsass loading dbgcore.dll it may work.

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  18. proslijedio/la je Tweet
    29. sij
    Poništi
  19. proslijedio/la je Tweet
    29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  20. proslijedio/la je Tweet
    23. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·