Sébastien C.

@SebChb

Security researcher Vulnerability research/reverse engineering enthusiast

Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @SebChb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SebChb

  1. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  2. proslijedio/la je Tweet
    14. sij
    Poništi
  3. proslijedio/la je Tweet

    Amazing work on the malware... Wonderful Christmas gift, thank you !!

    Poništi
  4. proslijedio/la je Tweet
    14. pro 2019.

    Archive of is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!

    Poništi
  5. 29. stu 2019.

    Hi , ho un problema con un biglietto. DM?

    Poništi
  6. proslijedio/la je Tweet
    6. stu 2019.

    A random bit of trivia I remembered recently. Got a DOS box with a password protected BIOS and no tools handy? Corrupt CMOS checksum with this simple command and get inside after reboot: echo “dummy” > CLOCK$

    Poništi
  7. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  8. proslijedio/la je Tweet
    10. lis 2019.

    Good PE parsing finds by that were fixed this month One of the issues he found was a bug that I introduced when refactoring code for RFG :( Takeaway: devs who know how to write secure code are still prone to make mistakes (if the lang lets them)

    Poništi
  9. proslijedio/la je Tweet
    29. ruj 2019.

    JSON originally had comments. They were removed. (This was explained on Google+. Then Google removed the explanation. Luckily saved it.)

    Poništi
  10. proslijedio/la je Tweet
    22. ruj 2019.
    Odgovor korisniku/ci
    Poništi
  11. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. srp 2019.

    About the "security issue" on : VLC is not vulnerable. tl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago. VLC since version 3.0.3 has the correct version shipped, and did not even check their claim. Thread:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    11. srp 2019.

    I wrote a thing about a Chakra RCE for which the JIT trigger is tweetable :) function opt(o) { o.pwn = o.a; }

    Poništi
  14. proslijedio/la je Tweet
    10. srp 2019.

    PayloadsAllTheThings is now ready for the Kali Linux repository! 🥂 You can install it with: "apt install payloadsallthethings" Thanks to for his incredible work !

    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet
    21. svi 2019.

    CVE-2019-5514 is a cool RCE in VMware Fusion 11, abusing an unauthenticated REST endpoint running on localhost 😎

    Poništi
  17. proslijedio/la je Tweet
    16. svi 2019.

    Wanna pentest with me? ➡️I recruit an experienced pentester as a colleague for my team in Paris (La Défense) 🇫🇷 Company is (not a consulting company): multinational which produces and distributes construction and high-performance materials 🏗️

    Poništi
  18. proslijedio/la je Tweet

    We've confirmed exploitability of Windows Pre-Auth RDP bug (CVE-2019-0708) patched yesterday by Microsoft. Exploit works remotely, without authentication, and provides SYSTEM privileges on Windows Srv 2008, Win 7, Win 2003, XP. Enabling NLA mitigates the bug. Patch now or GFY!

    Poništi
  19. proslijedio/la je Tweet
    11. svi 2019.

    Chosen-prefix collision attack against SHA1 hash function is a big deal. This even though SHA1 should no longer be used in security-important contexts (but it sometimes is!).

    Poništi
  20. proslijedio/la je Tweet

    "By default, Nmap version detection skips TCP port 9100 because some printers simply print anything sent to that port, leading to dozens of pages of HTTP GET requests, binary SSL session requests, etc." TIL

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·