Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @HectorCuesta
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HectorCuesta
-
Prikvačeni tweet
After analysing the root cause of CVE-2019-0547 I discover a new issue in the Windows DHCP client, this was assigned CVE-2019-0726 and fixed in the latest Path Tuesday, happy to bugcollide with multiple good researchers :) https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0726 …pic.twitter.com/gln9mRGoXi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Check out
@Nosoynadiemas ' tips on Fuzzing, to overcome known challenges and maximize results:https://securitylab.github.com/research/fuzzing-challenges-solutions-1 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Assert yourself on the browser playground with
@mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hector Cuesta proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Simplest and strangest sandbox escape I've found in Chrome was just derestricted https://crbug.com/1000002
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
In the 1st of our Top 5 bugs for 2019,
@hosselot takes a look at a sandbox escape in#Firefox originally submitted to the program by@_niklasb. Read the details at http://bit.ly/2M0XatD#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups. Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.https://syedfarazabrar.com/2019-12-13-starctf-oob-v8-indepth/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.https://gts3.org/2019/Real-World-CTF-2019-Safari.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned. https://securitylab.github.com/research/ubuntu-whoopsie-daisy-overview …pic.twitter.com/hqNAm8Bnzn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Thinking Outside the JIT Compiler: Understanding and Bypassing StructureID Randomization with Generic and Old-School Methods
#MobileSecurity#iOSsecurity#BHEU2019 [SLIDES] by@ThomasKing2014 https://i.blackhat.com/eu-19/Thursday/eu-19-Wang-Thinking-Outside-The-JIT-Compiler-Understanding-And-Bypassing-StructureID-Randomization-With-Generic-And-Old-School-Methods.pdf …pic.twitter.com/SdR6uV6ezn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. https://github.com/0vercl0k/CVE-2019-11708 …pic.twitter.com/LeAOCgqpMG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Introducing the fzero fuzzer! A target-architecture-agnostic grammar-based fuzzer (inspired by F1). With no input size constraints, multi-thread support, and all Rust code for no corruption bugs. 5x faster than the worlds fastest grammar-based fuzzer ;Dhttps://github.com/gamozolabs/fzero_fuzzer …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Windows
#UAC isn't a favorite feature, but@HexKitchen details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)http://bit.ly/2QyFQPJHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
From now on you can run CodeQL queries using Visual Studio Code, Eclipse is no longer needed


https://securitylab.github.com/tools/codeql Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
A primer on
@Semmle from@HectorCuesta https://sensepost.com/blog/2019/the-power-of-variant-analysis-semmle-ql-cve-2019-15937-and-cve-2019-15938/ … Including how he used it to find CVE-2019-15937/8 in the barebox bootloader & a t-shirt challenge.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Wonderful example and nice intro to variant analysis by
@HectorCuesta: https://sensepost.com/blog/2019/the-power-of-variant-analysis-semmle-ql-cve-2019-15937-and-cve-2019-15938/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
In the next installment of our series on using Semmle QL for vulnerability hunting,
@l4wio shows how to research DOM-based XSS by finding sources and sinks.https://msrc-blog.microsoft.com/2019/11/06/vulnerability-hunting-with-semmle-ql-dom-xss/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: https://gist.github.com/saelo/dd598a91a27ddd7cb9e410dc92bf37a1 … It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
We added AddressSanitizer (ASan) support to MSVC in the latest Visual Studio preview. So now you can not only use it for applications targeting Linux from VS, but Windows too, to find runtime memory issues fast:https://devblogs.microsoft.com/cppblog/addresssanitizer-asan-for-windows-with-msvc/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hector Cuesta proslijedio/la je Tweet
How a double-free bug in WhatsApp turns to RCEhttps://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.