hasherezade

@hasherezade

Programmer, analyst. Author of , , . Private account. All opinions expressed here are mine only (not of my employer etc)

Poland
Joined July 2013

Tweets

You blocked @hasherezade

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @hasherezade

  1. Pinned Tweet
    Jul 30
    Undo
  2. Retweeted
    14 hours ago
    Undo
  3. Retweeted
    Sep 2

    9-2-2018: [Updated] "loader.dll": version | Internal Control Functions | Debug Check Template Note: Groups behind are one of the more sophisticated out of there continuously improving code and innovate since the ISFB code leak😉 Source:

    Undo
  4. Retweeted
    16 hours ago

    If you work in infosec and don't feel overwhelmed at times, you probably don't really understand what you're doing...

    Undo
  5. Retweeted
    18 hours ago

    Here’s the video from my BlackHat talk on reversing WeddingCake: an Android anti-analysis native library. We go through the author’s anti-analysis techniques, my process to reverse it, and lessons learned.

    Undo
  6. Retweeted
    16 hours ago

    We are not Check Point's Malware Hunter Team. Or, with other words: We are not employees of Check Point. Or, with other words: We have nothing to do with Check Point. Everyone understood? 😂

    Undo
  7. Retweeted
    Sep 3

    RAT campaign in Poland. Using RTF exploit. Mail Subject "Wezwanie do zapłaty" Document SHA1: 20F57F4EB6CF358AF82CBC4BB18433063B6F263E C&C: test200[.]dynu[.]net cc:

    Undo
  8. Retweeted
    Sep 1
    Undo
  9. Retweeted
    Sep 2
    Undo
  10. Retweeted
    Sep 2

    "Injecting .Net Assemblies Into Unmanaged Processes" This is pretty amazing!

    Undo
  11. Retweeted
    Aug 14

    Slides from my talk at DEFCON 26: RING 0/-2 ROOKITS : COMPROMISING DEFENSES -- Thank you for everything! I had an outstanding week.

    Undo
  12. Retweeted
    Aug 31

    "But how do you know?" I've written hundreds (maybe over 1000) protocol-parsers (like in Wireshark) and file-format parsers (like in AV). I mean, look at the X.509 and SMB parsers I casually toss into masscan.

    Show this thread
    Undo
  13. Retweeted
    Aug 31

    Wireshark has the largest attack surface of any known application. It's trivial to find 0days in it. Using it not in a VM is extraordinarily dangerous.

    Show this thread
    Undo
  14. Retweeted
    Sep 1

    Cool post. Another interesting thing about this API (to me) is that it lets you write to kernel (Owner Bit Clear) pages :)

    Undo
  15. Retweeted
    Sep 1

    Bug Bounties and Mental Health. Let me know if you find this useful -- I don't often write blog posts.

    Undo
  16. Retweeted
    Sep 1

    Can't decide that scammers faking as McAfee or this is more laughable... 🤔 😂

    Show this thread
    Undo
  17. Retweeted

    Guys from the Zero Day Initiative wrote a blog post about the simpler kind of bugs in Oracle VirtualBox, including those discovered by myself (hey, thanks for sparing me a write-up! 😜). Most importantly, they dropped a working PoC. Go ahead, it’s easy ->

    Undo
  18. Aug 31
    Undo
  19. Retweeted
    Aug 30

    Go install `bat` right now. $ brew install bat It is like `cat`, but with wings.

    , , and 2 others
    Undo
  20. Retweeted
    Aug 30

    Being pressured to give someone your number? Give them my latest creation. +44 7479 276673 (or "+44 7479 27 NOPE") If someone texts it they'll get a message asking them to call. If they call, they get a text message explaining the situation, and suitable music plays. Try it!

    Show this thread
    Undo
  21. Retweeted
    Aug 31

    Wild story. Lawsuits against NSO based on leaked emails and documents provided to a Qatari journalist. I got this gut feeling might have had something to do with it.

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·