Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_hugsy_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_hugsy_
-
Prikvačeni tweet
Released the materials for the
@defcon#workshop by@0vercl0k and I: modern debugging with#windbg (https://github.com/hugsy/defcon_27_windbg_workshop/ …), including the cheatsheet to get you started. Thanks to all of those who attended, and feedback are always welcome!pic.twitter.com/gWD5AaSYNY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE https://blog.doyensec.com/2020/02/03/heap-exploit.html …
#infosecpic.twitter.com/z5ZUEETMnp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
New blog post: Intercepting the Windows 10 (1903) System Service call using the weakness caused by the dynamic trace supporthttps://www.oguzkartal.net/blog/index.php/20a19/08/26/intercepting-the-windows-10-system-service-call-using-the-weakness-caused-by-the-dynamic-trace-support/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Yearly reminder that https://ntdiff.github.io/ by
@PetrBenes is awesome sauce
pic.twitter.com/kp0JmavIx4
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2020/01/chasing-polar-bears-part-2.html … Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
I made a goose that destroys your computer Download it free here: http://samperson.itch.io/desktop-goose pic.twitter.com/cCGdoOYW1Y
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
PoC for CVE-2019-1125 (SWAPGS attack)https://github.com/bitdefender/swapgs-attack-poc …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.https://techcommunity.microsoft.com/t5/windows-kernel-internals/dtrace-on-windows-20h1-updates/ba-p/1127929 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
crazy rabbidz proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
TIL nesting
#virtualbox guests in#hyper-v VMs finally works! This is going to make#vbox research so much easier...pic.twitter.com/C6Zy4Snq0l
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
OK, 1and1 supposedly has unlimited bandwidth, so here it goes! ~full Windows 10 TP Source Tree: http://windows-internals.com/source/files.html …. cc
@markrussinovichHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level. https://blog.tetrane.com/2020/01/22/bluekeep.html …pic.twitter.com/aA8gvu2Brs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL"
Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)
https://repnz.github.io/posts/practical-reverse-engineering/dumping-dpc-queues/ …pic.twitter.com/3lguXVoMAF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
crazy rabbidz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
crazy rabbidz proslijedio/la je Tweet
Windows kernel explorer: A free powerful Windows kernel research toolhttps://github.com/AxtMueller/Windows-Kernel-Explorer …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
crazy rabbidz proslijedio/la je Tweet
If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals. https://twitter.com/yarden_shafir/status/1217728223355817986 …pic.twitter.com/rfFlA1aZXR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
crazy rabbidz proslijedio/la je Tweet
Fuck algebra. You can just set the base point to the public key of the cert you want to spoof. This is the best day.https://twitter.com/CasCremers/status/1217510293040844800 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.