Joel Eriksson

@OwariDa

CTO of Cycura. Vulnerability researcher, reverse-engineer, exploit developer and malware analyst. CTF player in HackingForSoju.

Uppsala, Sweden
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @OwariDa

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @OwariDa

  1. 3. sij

    People that have the UltimateHackingKeyboard should check their input device permissions (keylogging and keystroke injection by unprivileged users was possible, fix available now):

    Poništi
  2. 5. pro 2019.

    It's funny how this flaw keeps coming back in different incarnations over the years (first time was back in 1994 on AIX, rlogin -l -froot anyone?):

    Poništi
  3. 3. pro 2019.

    Anyone know why __sanitizer_symbolize_pc() produces <null>/0 for the f/l/s format specifiers (function, line, filename), even though the binary (or the .so, rather, in this case) has debugging info and is not stripped?

    Poništi
  4. 3. pro 2019.

    Not sure what their PR department was thinking, but I'm sure a lot of people thought the roles suited them very well at the time! XD Comedy gold!

    Poništi
  5. 3. pro 2019.

    Spicing up code review feedback with quotation marks: Wow, "your" code looks great! Wow, your "code" looks great! Wow, your code looks "great"!

    Poništi
  6. 14. stu 2019.

    My "office" while I'm in Bucharest

    Poništi
  7. 13. stu 2019.

    There are 3 unwritten rules in life. 1. 2. 3. You're welcome. ;)

    Poništi
  8. 16. lis 2019.

    She's not just our Director of Consulting - She's brilliant, go see her if you have the chance! :)

    Poništi
  9. 5. ruj 2019.

    Love it! :) Even though double-fetches are pretty much non-existent in the mainline Linux kernel, thanks to UDEREF/PaX and nowadays SMAP making sure that instances of not using copy_from_user() has been found. Love that the double-fetch was introduced by the compiler as well.

    Poništi
  10. 15. kol 2019.
    Prikaži ovu nit
    Poništi
  11. 15. kol 2019.

    Say what you want about Elon Musk, but this sounds pretty spot-on to me.

    Prikaži ovu nit
    Poništi
  12. 15. kol 2019.
    Poništi
  13. 24. srp 2019.

    RIP Rutger Hauer. All those moments will be lost in time, like tears in rain.

    Poništi
  14. 29. svi 2019.

    Two songs here so far, a cover of Lost On You that I recorded yesterday, and a short original song I made with FL Studio five months ago that I had completely forgotten about. 😄 The latter was done in a few hours one late night..

    Poništi
  15. 24. tra 2019.

    Whole lot of CoW:ing going on! :) Really impressive work!

    Poništi
  16. 22. tra 2019.
    Poništi
  17. proslijedio/la je Tweet
    4. tra 2019.

    It's finally here - source code released! The repository now contains the source for the core framework, the decompiler, features, and extensions.

    Poništi
  18. 5. ožu 2019.
    Poništi
  19. 12. velj 2019.

    And trojanize nodes in Kubernetes clusters they can run containers on, of course.

    Prikaži ovu nit
    Poništi
  20. 12. velj 2019.

    Note that local docker privileges are equivalent to root in the normal case, since the attacker can use -v /:/pwn to get access to the filesystem on the host. With this vulnerability, an attacker can prepare a docker image / Dockerfile that trojanizes the host when used though.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·