Neeraj Pal

@_neerajpal

(Open|Free) BSD kernel 😍| System Security | Network Security | Linux 😎

Joined February 2011

Tweets

You blocked @_neerajpal

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @_neerajpal

  1. Aug 16
    Undo
  2. Retweeted
    Aug 14

    Read our technical analysis of Foreshadow related discoveries now! Mark Silberstein, Daniel Genkin, Frank Piessens,

    Undo
  3. Retweeted
    Aug 15

    Theo de Raadt on the impact of the Intel on . “We asked repeatedly, but Intel provided no advance notice. We did not even receive replies to our requests for dialogue. On a side note, AMD cpus are not vulnerable to this problem.”

    Undo
  4. Retweeted
    Aug 14

    Following seven months of responsible disclosure, we are happy to announce that our Foreshadow attack is now public . Work with Mark Silberstein, Daniel Genkin, Frank Piessens

    Show this thread
    Undo
  5. Aug 12
    Undo
  6. Retweeted
    Aug 9

    GOD MODE UNLOCKED: hardware backdoors in some x86 CPUs White paper coming tomorrow.

    Undo
  7. Retweeted
    Aug 8

    stsp@ talks about the hashcat WPA2 PMKID crack, with regards to based APs. TL;DR: doesn't affect OpenBSD, and don't depend on WPA for end-to-end security.

    Undo
  8. Aug 3

    Got it. Thanks for help.

    Show this thread
    Undo
  9. Aug 3

    Anyone from know the calculation or answer of this post then please let me know.

    Show this thread
    Undo
  10. Aug 3

    like, in your case [2nd PoC], you hard-coded the offset value as "0x1f6faa" in exploit code function "get_libc_base_from_leak()" to retrieve the libc base addr. And also 2nd query is about the payload string, why did you push 12 extra bytes after canary?

    Show this thread
    Undo
  11. Aug 3

    here, in your case, you hard-coded the value of offset is, 0x3bbac0.

    Show this thread
    Undo
  12. Retweeted
    Jul 27

    Happy System Administrator Appreciation Day!

    Undo
  13. Retweeted
    Jul 24

    More mitigations against speculative execution vulnerabilities

    Undo
  14. Jul 23
    Undo
  15. Retweeted
    Jul 23

    Paper of new Spectre variant called SpectreRSB is out: „none of the known defenses including Retpoline and Intel's microcode patches stop all SpectreRSB attacks.“

    Undo
  16. Retweeted
    Jun 28

    I am so excited to finally share my baby with the world: The RE workshop I taught in is now available online. I hope it will be helpful to any RE newcomer who's afraid of x86 :) * Not for mobile. * Solutions to be published soon. * I feedback.

    Show this thread
    Undo
  17. Retweeted
    Jul 13
    Undo
  18. Retweeted
    Feb 26

    Memory segmentation cheat sheet

    Undo
  19. Retweeted
    Undo
  20. Retweeted
    Jul 10

    Overview and full details on including paper is online at cc

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·