Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @PhilipTsukerman
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PhilipTsukerman
-
Prikvačeni tweet
An incomplete list of personal learning/research goals for the next few months/year(s?), in no specific order: - Get comfortable enough with UEFI to conduct my own research - Write my first non-toy Windows driver (that's not an APC injector)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I just wanted to plug my bass into a sound card at a friend's house, but it seems like for me, playing music might require more driver debugging than previously assumed.pic.twitter.com/m9W4W3JmNN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
After examining and rereading
@tiraniddo, MS solution to most Elevation of Privilege (Symbolic\Hard Link) attacks is: Either keeping an open handle to the exploited resource or doing local impersonation correctly. Like in https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0635 … Or in https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1161 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thank you, Yiddish Wikipedia page for Windows Me, for being my guiding light in these trying times. https://yi.m.wikipedia.org/wiki/Windows_Me
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Random question time: Does anyone know what the various "TearoffThunk" vtables in mshtml.dll are supposed to do? From my extremely brief analysis, it seems like they might be used as proxies for a few COM interfaces, but any further information would be much appreciated.pic.twitter.com/UTYOYDdrxo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A rare non-infosec tweet:
@bentkneemusic is a fantastic band. Their music is that right kind of weird which makes me pick up an instrument for hours and write new stuff of my own. Go listen to them! That's it. Back to talking about Windows or whatever.https://youtu.be/e9QAlYV6qsYHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
I need to do more of these. Here is my first
#FF of the year:@leoloobeek@Oddvarmoe@xenosCR@ConsciousHacker@curi0usJack@CyberWarship@EranShimony@PhilipTsukerman@mrgretzkyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anyway, no mitigation bypasses here (at least according to my quick analysis), but this has been a nice opportunity to learn...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
BTW - Looks like the .Net Core 3.0.0 version of System.Private.CoreLib.dll doesn't have a RWX section anymore, so you can load it into a process with ACG and MicrosoftSignedOnly CIG, but it won't give you any fun RWX buffers to play with :(
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This happens because MiMapViewOfImageSection actually checks the section permissions of loaded images, and calls MiArbitraryCodeBlocked (the main ACG function) when needed. Looks like MSFT has already considered this scenario against ACG :)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sadly, it seems that while you're able to map RX memory into the process (which is necessary to load a library), ACG restricts RWX memory even when mapped as part of an image. Trying to load this dll into Edge will fail with STATUS_DYNAMIC_CODE_BLOCKED.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I thought such a library could be used as a CIG+ACG bypass, but it looks like this won't work. The idea was to load the MSFT signed library into Edge, which would get the process to map some RWX memory (as you can't just VirtualAlloc/Protect executable memory under ACG).https://twitter.com/mattifestation/status/1216683123901181954 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
Need some help from the community. Mu baby sister (she hates when I call her that) has thyroid cancer and needs help with her medical bills. Mu wife created this GoFundMe page to help her out with her bills. Any amount helpshttp://gf.me/u/wzk7qs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
Hey, new uploads to Windows-Insight: - an article on invocations between ci.dll and skci.dll: https://github.com/ernw/Windows-Insight/blob/master/articles/Device%20Guard/WDAC/dg_ci_skci_signed.pdf …; - a WiP paper on a framework for executing Hyper-V hypercalls (this allows fuzzing and testing performance): https://github.com/ernw/Windows-Insight/blob/master/articles/VSM/milenkoski_issrew_signed.pdf … (code will follow soon!)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
Research on the Windows Defender ELAMhttps://n4r1b.netlify.com/en/posts/2019/11/understanding-wdboot-windows-defender-elam/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Is NAR (as in SkmiOperateOnLockedNar) short for "Normal Address Range"? I'm guessing the meaning of too many unknown terms recently, and I'm afraid that I might be living in some sort of made up acronym fantasy...
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
Hey, I just uploaded a couple of articles on DeviceGuard/WDAC internals in the Windows-Insight repo: https://github.com/ernw/Windows-Insight/tree/master/articles/Device%20Guard/WDAC …. More articles on WDAC internals focusing on the most recent implementation (incl. new policy file management, driver blacklisting etc.) coming soon!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
While reverse engineering a rootkit sample (That I soon will publish about
) I saw this weird compiler optimization.
I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
https://repnz.github.io/posts/reversing-optimizations-division/ …pic.twitter.com/RufA3fHDa4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
As I'm currently missing
#bluehatseattle and so can't troll@blowdart in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering https://tyranidslair.blogspot.com/2019/10/bypassing-low-type-filter-in-net.html ….Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
My
@CppCon talk is also online!
https://twitter.com/CppCon/status/1185419553347526656 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Philip Tsukerman proslijedio/la je Tweet
Just published my latest project "ByePg", exposing an entirely new attack surface to PatchGuard/NT and bringing
@nickeverdox's InfinityHook back:https://blog.can.ac/2019/10/19/byepg-defeating-patchguard-using-exception-hooking/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.