Ox9A82

@Ox9A82

Security researcher. Focus on Windows Security. HITB AMS 2019 Speaker.

BeiJing
Vrijeme pridruživanja: srpanj 2014.

Tweetovi

Blokirali ste korisnika/cu @Ox9A82

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ox9A82

  1. proslijedio/la je Tweet
    10. ruj 2019.

    First bug bounty submission for Chromium Edge. This kept us busy today. Great work!

    Poništi
  2. 16. sij
    Poništi
  3. proslijedio/la je Tweet
    14. sij

    TBH I'm more interested in what has found in .NET this time :-)

    Poništi
  4. 8. sij

    A great patch analysis. It would be better if could exploit without NtQuerySystemInformation.

    Poništi
  5. proslijedio/la je Tweet
    14. stu 2019.

    [Blog] A simple write-up for a recent discovery - CVE-2019-1378 - WUA Priv Esc

    Poništi
  6. proslijedio/la je Tweet
    17. stu 2019.

    Happy to successfully exploited Edge Browser + Sandbox Bypss at ,and our Sandbox Bypass vulnerability can exploit Chrome Sandbox as well. Details of the relevant vulnerabilities will be published at the appropriate time. Credit goes to our team members. 👻

    Poništi
  7. proslijedio/la je Tweet
    17. stu 2019.

    On to part 2 in my series on AppLocker internals. This time I go into how AppLocker blocks process creation (or does it?), and some of the ways that you can opt-out of AppLocker if you're special enough.

    Poništi
  8. proslijedio/la je Tweet
    16. stu 2019.

    Published part 1 of a short series on AppLocker internals, no bypasses, just how the technology actually works on Windows 10 1909 and maybe some silly tricks along the way.

    Poništi
  9. proslijedio/la je Tweet
    15. stu 2019.

    [Blog] CVE-2019–12757: Local Privilege Escalation in Symantec Endpoint Protection

    Poništi
  10. proslijedio/la je Tweet

    Windows Kernel win32k.sys TTF font processing: pool corruption in win32k!ulClearTypeFilter

    Poništi
  11. proslijedio/la je Tweet

    Windows Kernel NULL pointer dereference in nt!MiOffsetToProtos while parsing malformed PE file

    Poništi
  12. proslijedio/la je Tweet

    Windows Kernel out-of-bounds read in CI!CipFixImageType while parsing malformed PE file

    Poništi
  13. proslijedio/la je Tweet

    Windows Kernel out-of-bounds read in nt!MiParseImageLoadConfig while parsing malformed PE file

    Poništi
  14. proslijedio/la je Tweet

    Windows Kernel out-of-bounds read in CI!HashKComputeFirstPageHash while parsing malformed PE file

    Poništi
  15. proslijedio/la je Tweet

    Windows Kernel out-of-bounds read in nt!MiRelocateImage while parsing malformed PE file

    Poništi
  16. proslijedio/la je Tweet
    8. lis 2019.

    Windows Error Reporting privilege escalation (CVE-2019-1315) Fixed in October updates

    Poništi
  17. proslijedio/la je Tweet
    10. lis 2019.

    Security Descriptor Auditing Methodology: Investigating Event Log Security In this post, I establish my process for identifying access rights, determining default security, consideration of abuse implications, audit automation, and SACL research. Enjoy!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. lis 2019.

    Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,

    Poništi
  19. proslijedio/la je Tweet

    Cyber Security - (Windows-Kernel-Explorer: powerful Windows kernel research tool) has been published on -

    Poništi
  20. proslijedio/la je Tweet
    14. velj 2019.

    New blog release "Accessing Access Token for UIAccess" on restoring some small part of the older token stealing attack which was killed in Windows 10 RS5. Contains an example PS script to script an admin command prompt 😄

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·