Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_fel1x
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_fel1x
-
Prikvačeni tweet
CVE 2018-1111 is a pretty bad DHCP remote root command injection affecting Red Hat derivates: https://access.redhat.com/security/vulnerabilities/3442151 …. Exploit fits in a tweet so you should patch as soon as possible.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Super excited about joining the team :)https://twitter.com/benhawkes/status/1224387435590606848 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
This is a particularly interesting and serious vuln in Azure and a great write up by
@ronenshhhttps://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Just looking at this UAF in net ingress path: https://patchwork.ozlabs.org/patch/1227599 Which fixes "tcp: Fix highest_sack and highest_sack_seq" which fixes "tcp: highest_sack fix" which fixes "tcp: use sequence distance to detect reordering"... One of them took 2+ years to discover...
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Qualys Security Advisory: Authentication vulnerabilities in OpenBSD's auth system (CVE-2019-19521). LPE on default install via xlock (CVE-2019-19520) and su (CVE-2019-19519). Local root if S/Key or yubikey is enabled (CVE-2019-19522). More details at https://www.openwall.com/lists/oss-security/2019/12/04/5 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'll be in London next week for Blackhat Europe. Hit me up if you’d like to meet there.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
We’ve just published a new article about typical security issues in JSON Web Tokens (JWT). Learn about the eleven thorns right here:https://research.securitum.com/jwt-json-web-token-security/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Felix Wilhelm proslijedio/la je Tweet
Uh-oh, I see security bugs coming. Found by
@moarbugs and his#JQF. Certain data structures in Java Apache Commons: Insert "x". Insert "x\u0000". Now "x" is not in there anymore. https://issues.apache.org/jira/browse/COLLECTIONS-714 … also, a#teaser for my talk at#swisscyberstormPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Haha, I googled the strings in the output, it seems like he's using a hacked up http://cado-nfs.py , e.g. "Info:root: Set tasks.threads=8 based on detected logical cpus" - https://www.mersenneforum.org/showthread.php?t=23091 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Having spent most of this week editing
@i41nbeer 184-page “blogbook”, I’d like to highlight three things so they don’t get missed: 1.@5aelo's JSC exploit piece (https://googleprojectzero.blogspot.com/2019/08/jsc-exploits.html …) on patch gapping and n-day bugs being used as an easy way to score 0-day like capabilitiesPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nice talk on container escapes by
@drraid and@0x7674: https://i.blackhat.com/USA-19/Thursday/us-19-Edwards-Compendium-Of-Container-Escapes.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
So... we'll give out 100k USD in Grants for Google Cloud vulnerability research and we'll pay the best report we get in 2019 another 100khttps://security.googleblog.com/2019/08/awarding-google-cloud-vulnerability.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Check out "Open Sourcing the #Kubernetes Security Audit" from@cra on the blog today!
Chris shares the audit process and results
https://bit.ly/2MGmHt3 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Facebook on scaling static code analysis https://cacm.acm.org/magazines/2019/8/238344-scaling-static-analyses-at-facebook/fulltext … (cc
@WeldPond)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Forgot to mention this, but grsec has prevented this attack and ones like it since 2013 (they're all based off call_usermodehelper and it being modifiable in a container but interpreted on the host fs)https://twitter.com/_fel1x/status/1151487051986087936 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
Earlier this year I FOIAed the FBI for details on allegations of backdoor installed in the IPSEC stack in 2010, originally discussed by OpenBSD devs (https://marc.info/?l=openbsd-tech&m=129236621626462 …) Today, I got an interesting but unexpected responsive record: https://www.muckrock.com/foi/united-states-of-america-10/foia-fbi-openbsd-70084/ …
#FOIAfridayPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Felix Wilhelm proslijedio/la je Tweet
.
@leonjza and I just spent some time on this. Let's explain what we think we figured out. First up, cgroup release notifications allow a program (the release agent) to be run when the cgroup becomes empty. Source http://man7.org/linux/man-pages/man7/cgroups.7.html …https://twitter.com/_fel1x/status/1151487051986087936 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature.pic.twitter.com/q8BI8ASBO8
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Felix Wilhelm proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.