Tweetovi

Blokirali ste korisnika/cu @Ivanlef0u

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ivanlef0u

  1. proslijedio/la je Tweet
    prije 13 sati
    Poništi
  2. proslijedio/la je Tweet
    prije 16 sati

    just found that this writeup for CVE-2019-9793, a range analysis bug in Spidermonkey found by and analyzed by me is now unrestricted: I thought it was a cool bug, although unfortunately Spectre mitigations prevented exploitation as far as I know

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 17 sati

    Dejablue Vulnerabilities in Windows 7 to Windows 10 [CVE-2019-1181 and CVE-2019-1182] - Core Security

    Poništi
  4. proslijedio/la je Tweet
    prije 21 sat

    Here are the slides for my presentation today at on variant analysis for 0-days used in the wild. I discuss 3 case studies, covering the approach, findings, and lessons learned.

    Title Slide that reads "Where's Waldo...'s Brothers and Sisters? Variant Analysis on Recent 0-days, Maddie Stone, @maddiestone, Bluehat IL 2020"
    Poništi
  5. proslijedio/la je Tweet
    5. velj

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Read about our investigation of web shell attacks, which allow adversaries to run commands and steal data from vulnerable or misconfigured Internet-facing servers, or to use the compromised servers as launch pads for further attacks.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. velj

    As promised, here is the follow up defensive blog to last weeks post on Attacking Azure.

    Poništi
  8. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1234 (Azure Stack): Azure Stack Spoofing Vulnerability

    Poništi
  9. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1372 (Azure App Service): Heap Based Buffer-Overflow in DWASInterop.dll

    Poništi
  10. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  12. proslijedio/la je Tweet
    2. velj
    Poništi
  13. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  14. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    31. sij
    Poništi
  16. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  18. proslijedio/la je Tweet
    31. sij

    CVE-2019-1406 : Microsoft Jet Engine ColumnLvText Type Confusion CVE-2019-1250 : Microsoft Jet database Record::IsNull Memory Corruption Found by &

    Poništi
  19. proslijedio/la je Tweet
    31. sij
    Poništi
  20. proslijedio/la je Tweet
    30. sij

    Trickbot trojan LEVERAGing A New Windows 10 UAC Bypass by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·