Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @SebChb
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SebChb
-
Sébastien C. proslijedio/la je Tweet
After a lot of work and some crypto-related delays, I couldn't be more proud to publish
@aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!): http://windows-internals.com/cet-on-windows/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Fifty shades darker: no safe wor(l)d in SMM by
@BrunoPujos https://www.synacktiv.com/posts/exploit/through-the-smm-class-and-a-vulnerability-found-there.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Amazing work on the
#predator malware... Wonderful Christmas gift, thank you@fumik0_ !!https://twitter.com/fumik0_/status/1209924318077095938 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Archive of http://kernelmode.info is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hi
@Alitalia, ho un problema con un biglietto. DM?Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
A random bit of trivia I remembered recently. Got a DOS box with a password protected BIOS and no tools handy? Corrupt CMOS checksum with this simple command and get inside after reboot: echo “dummy” > CLOCK$
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
#CVE-2019-11043 PHP-FPM Remote Command Execution https://github.com/neex/phuip-fpizdam/ …pic.twitter.com/XUJBbo5KtT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Good PE parsing finds by
@j00ru that were fixed this month One of the issues he found was a bug that I introduced when refactoring code for RFG :( Takeaway: devs who know how to write secure code are still prone to make mistakes (if the lang lets them) https://bugs.chromium.org/p/project-zero/issues/detail?id=1909 …https://twitter.com/j00ru/status/1182226925827379200 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
JSON originally had comments. They were removed. (This was explained on Google+. Then Google removed the explanation. Luckily http://archive.org saved it.)pic.twitter.com/hSSKQO1tgJ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Hope it helps! Hopefully you've also seen
@cci_forensics extensions to the code (blog https://www.carbonblack.com/2019/02/25/defeating-compiler-level-obfuscations-used-in-apt10-malware/ …, code https://github.com/carbonblack/HexRaysDeob …)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
I'm publishing some
research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.
https://googleprojectzero.blogspot.com/2019/08/down-rabbit-hole.html …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
About the "security issue" on
#VLC : VLC is not vulnerable. tl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago. VLC since version 3.0.3 has the correct version shipped, and@MITREcorp did not even check their claim. Thread:Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
I wrote a thing about a Chakra RCE for which the JIT trigger is tweetable :) function opt(o) { o.pwn = o.a; } https://phoenhex.re/2019-07-10/ten-months-old-bug …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
PayloadsAllTheThings is now ready for the Kali Linux repository!
You can install it with: "apt install payloadsallthethings"
Thanks to @g0tmi1k for his incredible work !https://github.com/swisskyrepo/PayloadsAllTheThings …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Sébastien C. proslijedio/la je Tweet
CVE-2019-5514 is a cool RCE in VMware Fusion 11, abusing an unauthenticated REST endpoint running on localhost
https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Wanna pentest with me?
I recruit an experienced pentester as a colleague for my team in Paris (La Défense)
Company is @saintgobain (not a consulting company): multinational which produces and distributes construction and high-performance materials
https://www.linkedin.com/jobs/view/1260871065/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
We've confirmed exploitability of Windows Pre-Auth RDP bug (CVE-2019-0708) patched yesterday by Microsoft. Exploit works remotely, without authentication, and provides SYSTEM privileges on Windows Srv 2008, Win 7, Win 2003, XP. Enabling NLA mitigates the bug. Patch now or GFY!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
Chosen-prefix collision attack against SHA1 hash function is a big deal. This even though SHA1 should no longer be used in security-important contexts (but it sometimes is!). https://eprint.iacr.org/2019/459.pdf pic.twitter.com/0UlUhnSoxi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sébastien C. proslijedio/la je Tweet
"By default, Nmap version detection skips TCP port 9100 because some printers simply print anything sent to that port, leading to dozens of pages of HTTP GET requests, binary SSL session requests, etc." TIL
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.