EranShimony

@EranShimony

Security researcher, malware analyst, low level lover and not too bad Starcraft 2 player Researcher at

Vrijeme pridruživanja: ožujak 2019.

Tweetovi

Blokirali ste korisnika/cu @EranShimony

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EranShimony

  1. proslijedio/la je Tweet
    30. sij

    In the past year, I was researching Azure Stack, which is an on-premise version of Azure Cloud. In the following blog posts, we present information on what is Azure Stack and its architecture and disclose a vulnerability in Azure App Service that allowed a sandbox escape.

    Prikaži ovu nit
    Poništi
  2. 26. sij

    After examining and rereading , MS solution to most Elevation of Privilege (Symbolic\Hard Link) attacks is: Either keeping an open handle to the exploited resource or doing local impersonation correctly. Like in Or in

    Poništi
  3. 22. sij

    Kaspersky, paying bounty only three days after the initial report. I'm impressed.

    Poništi
  4. 20. sij

    I got swag, not really. I would really appreciate however, if someone from Microsoft would explain once and for all, which vulnerability is worthy of a bounty and which vulnerability is just is a CVE with swag points.

    Poništi
  5. 15. sij

    Sometimes in the world of InfoSec, you have to wait, right? Lenovo patches CVE-2019-6173, CVE-2019-6196, after around 9 months since the initial report. I'm not sure it is a good practice 😐

    Poništi
  6. 14. sij

    First CVE of the year; Intel releases a fix to CVE-2019-14596, and MS releases a fix to CVE-2020-0635. A writeup should come soon.

    Poništi
  7. 14. sij

    I like vendors who work well with security researches, providing immediate response, and fast patching rate. Good job Trend Micro and Symantec: CVE-2019-19688, CVE-2019-19689, CVE-2019-19548

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    For anyone interested in my presentation on Local RPC in .NET the HITB version is now up on YouTube.

    Poništi
  9. 12. pro 2019.

    So let me get it straight. High severity bugs get me points? Thanks, Microsoft 😐

    Poništi
  10. proslijedio/la je Tweet
    5. pro 2019.

    Here is a short blog post showing how a service running with the LocalServiceAndNoImpersonation flag may get all its privileges back. 👌 👉

    Poništi
  11. 3. pro 2019.
    Poništi
  12. 30. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    29. stu 2019.

    I wrote up my comments on the technical aspect of the WhatsApp Vs NSO lawsuit here

    Prikaži ovu nit
    Poništi
  14. 20. stu 2019.

    Update programs are quite problematic - CVE-2019-6176. I wonder how many are there.

    Poništi
  15. proslijedio/la je Tweet
    8. stu 2019.

    Released to go with my talk, a project which contains a C# client for almost every ALPC RPC server on Windows 7 through Windows 10 1909. Could be useful for EoP research, fuzzing etc.

    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.

    Finally had some time to write about the autochk rootkit Nothing too fancy, but I do think it's nice :) The rootkit redirects hidden files and hides network connections. It's signed by a chinese company. I reconstructed the full source code just for fun;)

    Poništi
  17. 27. lis 2019.

    Dell CVE-2019-3726 write-up. One of many in recent vulnerabilities in Dell. DLL hijacking to the rescue :)

    Poništi
  18. proslijedio/la je Tweet
    17. lis 2019.

    Finally got around to writing a bit about some prior work, so here's some COM, SxS, random Windows stuff, unstable persistence/abuse opportunities, and me manually discovering things I should have read in documentation

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    10. lis 2019.

    Security Descriptor Auditing Methodology: Investigating Event Log Security In this post, I establish my process for identifying access rights, determining default security, consideration of abuse implications, audit automation, and SACL research. Enjoy!

    Prikaži ovu nit
    Poništi
  20. 4. lis 2019.

    Got CVE-2019-3745 from Dell. Using installers incorrectly seems to be a plage. Soon I'll have a blog about it.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·