Neeraj Pal

@_neerajpal

System & network security • Linux, (Open|Free)BSD • Offensive & defensive info-sec • Opinions are mine only. 0x74C8853A777E0EAB • Linkedin: /in/neerajpal09/

Vrijeme pridruživanja: veljača 2011.

Tweetovi

Blokirali ste korisnika/cu @_neerajpal

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_neerajpal

  1. Prikvačeni tweet
    20. kol 2019.

    My first bug(s) on (kernel + userspace(ping(8)). However, didn't make it to CVE as it requires "root privilege", said by the developers. It was a great experience though, learned a lot. 🙂🙂

    Poništi
  2. 14. sij

    New member in my hardware family. Ready to learn and play with it.😍 Thanks

    Poništi
  3. 9. sij

    Nice, compiler development series from scratch by

    Poništi
  4. 25. pro 2019.

    correct 👍. Curiosity matters the most.

    Poništi
  5. proslijedio/la je Tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  6. 29. stu 2019.
    Poništi
  7. proslijedio/la je Tweet
    27. stu 2019.

    Before I had always-on Internet, I was always looking things up in "HelpPC", an amazing DOS program with detailed info about the PC, the BIOS, DOS, x86 assembly, and the C standard library. Here it is on the web, same colors and all! 👨‍💻❤️

    Poništi
  8. proslijedio/la je Tweet
    20. stu 2019.

    If anyone wants to follow along with booting a Clang-built CFI-enabled x86 kernel, I've written up the instructions to build the latest LLVM and 's LTO/CFI/SCS tree. Enjoy!

    Poništi
  9. proslijedio/la je Tweet
    14. stu 2019.

    You may already be running Linux v5.3! I'm excited about heap auto-initialization, pidfd_open(), global -Wimplicit-fallthrough, x86 CR4 & CR0 pinning, more kfree() sanity checks, arm64 default KASLR, and hardware security embargo documentation:

    Poništi
  10. proslijedio/la je Tweet
    12. stu 2019.

    Page cache attacks talk starts in 5 minutes. Kings A /cc

    Prikaži ovu nit
    Poništi
  11. 12. stu 2019.

    Interesting. Writing a "Hello world" in Pdf.

    Poništi
  12. proslijedio/la je Tweet
    7. stu 2019.

    AMD quietly announces some form of integrity protection for SEV: SEV-SNP (Secure Nested Paging).

    Prikaži ovu nit
    Poništi
  13. 9. stu 2019.

    Upgraded the OpenBSD VM from 6.3 to -current. After upgrading the sets, unable to boot to the new "bsd" image. Not sure whether the direct bumping the version is allowed or not.

    Poništi
  14. proslijedio/la je Tweet
    21. lis 2019.
    Poništi
  15. proslijedio/la je Tweet
    14. lis 2019.

    How to DELETE 99.9% of your digital footprint from the internet [a thread]

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. lis 2019.

    In the original (OpenBSD) reallocarray() implementation and specification, a new size of zero does not simply do a free(); it returns the equivalent of malloc(0), a pointer that can be freed. This means that the same bug would not happen in OpenBSD.

    Prikaži ovu nit
    Poništi
  17. 20. ruj 2019.
    Prikaži ovu nit
    Poništi
  18. 20. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    18. ruj 2019.

    GitHub is now a CVE Numbering Authority (CNA) 🎉 Disclose vulnerabilities, alert developers, and provide updates all from within GitHub. Coming soon!

    Poništi
  20. proslijedio/la je Tweet
    11. ruj 2019.

    Interesting work on fuzzing the kernel with unicorn.

    Poništi
  21. proslijedio/la je Tweet

    Our paper on synthesis of DWARF unwind tables for x86_64 binaries is out! Bonus: we can additionally speed up unwinding by a factor of 10x-25x. Feedback welcome!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·