Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @EiPP4ssenger
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EiPP4ssenger
-
EiP.P4ssenger proslijedio/la je Tweet
Oh, look, another awful vulnerability in a HiSilicon provided BSP for DVRs:https://habr.com/en/post/486856/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Last year,
@wvuuuuuuuuuuuuu researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:https://blog.rapid7.com/2020/02/04/doublepulsar-rce-2-an-rdp-story/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device. IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard. http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/2018/MSC/MSC-2018-21.pdf …pic.twitter.com/cylUxrqJsD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
HEVD -- Arbitrary Write, Win7 x64 https://h0mbre.github.io/HEVD_AbitraryWrite_64bit/# … Some weird, possibly self-induced, behavior on this one. Had to deal with a consistent overwrite of our first two shellcode buffer bytes. But we adapted and made it work. Let me know if you can provide clarity!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
@irsdl’s first post is a writeup for an RCE in SharePoint https://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Analyzing the Linux Kernel in Userland with AFL and KLEE https://blog.grimm-co.com/post/analyzing-the-linux-kernel-in-userland-with-afl-and-klee/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers https://wrongbaud.github.io/stm-xbox-jtag/ Hope you enjoy! As always ping me with any questions
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. https://github.com/vanhauser-thc/AFLplusplus/blob/master/llvm_mode/README.cmplog.md … I used it to build the Redqueen mutator in AFL++!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
After a long break, the third post in the
#hypervisor series has been published! We will see how#VMX helps with the#virtualization of restricted instructions and how#Bareflank allows for the implementation of handlers for them. Have a nice read. https://blog.3mdeb.com/2020/2020-01-23-vmx-exit-reasons-and-handlers/ …pic.twitter.com/8kIQ2ypBNX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
<3 viewing coverage into IDA after TA fuzzing with AFL Unicorn
@mobilesecurity_@quarkslab https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-2.html …pic.twitter.com/2n7iF4cQDI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Nice writeup+(0x41414141) PoC for Mozilla Firefox HTML5 Stream Parsing Use-after-free Vulnerability (CVE-2018-18500) by Yaniv Frank from
@SophosLabs: https://news.sophos.com/en-us/2019/04/18/protected-cve-2018-18500-heap-write-after-free-in-firefox-analysis-and-exploitation/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
How to use the Fuzz tool WinAFL—fuzzing the FreeImage image analysis library #
#fuzzing#offensivesecurity#reverseengineering#exploitdevelopment#vulnerability#softwaresecurity#infosechttps://lnkd.in/eP6EZK3Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
in-memory traces of ppldump, exploiting zam64.sys vulndriver to dump lsass memory, cool stuff. sysmon will show a generic\noisy calltrace so detection chances here are low, if combined with lsass loading dbgcore.dll it may work. https://github.com/realoriginal/ppldump … https://github.com/SouhailHammou/Exploits …pic.twitter.com/rbXCtivW3M
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). https://www.tiraniddo.dev/2020/01/dont-use-system-tokens-for-sandboxing.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
Scripting with Cutter and Jupyter notebooks.https://medium.com/@duzvik/scripting-with-cutter-and-jupyter-notebooks-79d588e5fbb5 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je Tweet
HEVD -- Arbitrary Write, Win7 x86 https://h0mbre.github.io/HEVD_AbitraryWrite_32bit/ … thanks to all the sourced bloggers, content producers, elders
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
EiP.P4ssenger proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.