Ionut Popescu

@NytroRST

Interested in C/C++, ASM, Windows internals, reverse engineering, exploit & shellcode development and advanced web exploitation. GitHub:

Bucharest
Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @NytroRST

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @NytroRST

  1. proslijedio/la je Tweet
    prije 9 sati

    My new article got published on NCC Groups's research blog: Properly Signed Certificates on CPE Devices -

    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    0day vulnerability (backdoor) in firmware for HiSilicon-based DVRs, NVRs and IP cameras

    Poništi
  3. proslijedio/la je Tweet
    prije 12 sati

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  4. proslijedio/la je Tweet
    prije 18 sati

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  5. prije 14 sati
    Poništi
  6. proslijedio/la je Tweet
    prije 15 sati

    Hey folks, published a new blog post on his work with DOUBLEPULSAR over RDP. Most of the currently published work is DOPU over SMB. He's also published a module for DOPU over RDP. Project Sonar blog post coming soon.

    Poništi
  7. proslijedio/la je Tweet
    prije 18 sati

    New 44CON TV video: HeapLab Taster: GLIBC Heap Exploitation by Max Kamper

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Dropbox's bug bounty has been lucky to work with some of the best researchers in the world to help keep Dropbox safe. We recently hit 1M USD payout and Nate wrote a great blog post on some of the best findings over the years

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  10. proslijedio/la je Tweet
    prije 21 sat
    Poništi
  11. proslijedio/la je Tweet
    4. velj

    Very useful tool if you are studying Drivers. Also really enjoyed the book: Windows Kernel Programming

    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Apple’s continuity protocol reverse enginered:

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    Hitting a CurveBall Like a Pro. No, this isn’t about baseball. Rather the very smart writes of CVE-2020–0601, AKA . Reported to by , & what you need to do fix this. Make sure you have handy.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Heap Overflow in F-Secure Internet Gatekeeper

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  16. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  17. proslijedio/la je Tweet
    3. velj

    VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packers

    Poništi
  18. proslijedio/la je Tweet
    3. velj

    new post about E4's cryptography, answering questions such as: - why AES SIV and not GCM? - why SHA-3 and not BLAKE2? - what about side channels? - how are keys stored? etc.

    Poništi
  19. proslijedio/la je Tweet
    3. velj

    Burp Suite extension to perform Kerberos authentication

    Poništi
  20. proslijedio/la je Tweet
    3. velj

    Fegu - first open source jailbreak based on the checkm8 exploit by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·