Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @__x86
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__x86
-
Prikvačeni tweet
Just uploaded on
@doar_e my slides for my@typhooncon talk on exploiting chrome by attacking TurboFan. Thanks@SecuriTeam_SSD for the opportunity to present :-) https://doar-e.github.io/presentations/typhooncon2019/AttackingTurboFan_TyphoonCon_2019.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Assert yourself on the browser playground with
@mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
New blog post. ARM hardware bug. In the specification. https://siguza.github.io/PAN/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug: https://github.com/0vercl0k/stuffz/blob/master/CVE-2019-1184/CVE-2019-1184.cc …pic.twitter.com/Osr4Rk2V8z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Slides + recording of my
#36c3 talk: https://saelo.github.io/presentations/36c3_messenger_hacking.pdf … https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage … had to omit many details, but blogpost coming soon!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Simplest and strangest sandbox escape I've found in Chrome was just derestricted https://crbug.com/1000002
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
In the 1st of our Top 5 bugs for 2019,
@hosselot takes a look at a sandbox escape in#Firefox originally submitted to the program by@_niklasb. Read the details at http://bit.ly/2M0XatD#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
New WinDbg Preview rolling out! Biggest addition - a new timelines window for visualizing when things like exceptions, memory accesses, breakpoints, and function calls occur in your trace. Also quick at-a-glance tooltips for each event just by hovering! https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/windbg-timeline-preview …pic.twitter.com/kw9OxM07Rl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
The video from my talk on structure-aware fuzzing at Black Hat was posted: https://www.youtube.com/watch?v=S8JvzWDnjc0 … I mostly cover libprotobuf-mutator but also discuss libFuzzer custom mutators.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow! https://googleprojectzero.blogspot.com/2019/12/sockpuppet-walkthrough-of-kernel.html …https://www.youtube.com/watch?v=YV3jewkUJ54 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. https://github.com/0vercl0k/CVE-2019-11708 …pic.twitter.com/LeAOCgqpMG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
It's the presentation I shared at POC2019, included some very simple but interesting bugs, if you are interested in Safari browser security, please check it!https://twitter.com/mobilesecurity_/status/1197065394026172416 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Correction: Take a deep dive into a
#Pwn2Own winning#WebKit bug as@ziadrb breaks down an entry used by@fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver.http://bit.ly/2OMZNj5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018. https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
We just released the challenges of this year's
#GoogleCTF finals together with a short write up of the intended solutions: https://github.com/google/google-ctf/blob/master/2019/finals/solutions.pdf … If anything is not clear, feel free to DM me and I can share more details about the challenges.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
Just discovered that there is a ctypes module accessible from privileged JS contexts in Firefox; kinda neat: https://developer.mozilla.org/en-US/docs/Mozilla/js-ctypes …pic.twitter.com/wsygA79K1l
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
I built an iOS kernel debugger called KTRW based on a KTRR bypass for the iPhone X. It is capable of patching kernel __TEXT_EXEC, loading kernel extensions, and performing single-step kernel debugging with LLDB and IDA Pro over USB:https://github.com/googleprojectzero/ktrw …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Jeremy Fetiveau proslijedio/la je Tweet
And for digging deeper there's the Mojo bindings for javascript that are fun to play with:https://docs.google.com/presentation/d/1wxPQZbx_eApgjNuupQeM8gFITdQNd6U75eDcCRgt4qM/edit#slide=id.g5bab1fee78_3_107 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.