Tweetovi

Blokirali ste korisnika/cu @_niklasb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_niklasb

  1. Prikvačeni tweet
    26. svi 2019.

    I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own

    Prikaži ovu nit
    Poništi
  2. 28. sij

    One thing I noticed is that the parent origin can set cookies for the sub-origin, thereby bypassing some CSRF protections based on cookies, are there other examples? or even generic XSS methods for this scenario?

    Prikaži ovu nit
    Poništi
  3. 28. sij

    I have a question for client-side web security folks: what are common ways in which an origin can compromise a sub-origin (i.e. and )?

    Prikaži ovu nit
    Poništi
  4. 21. sij

    Lot of OOB accesses being had today

    Prikaži ovu nit
    Poništi
  5. 21. sij
    Prikaži ovu nit
    Poništi
  6. 16. sij

    So even with a SEP exploit (none of which is publicly known) unlocking would be based on the assumption that the passcode has low entropy. maybe somebody more knowledgeable can correct me if I'm wrong?

    Prikaži ovu nit
    Poništi
  7. 16. sij

    I feel like it's an odd assumption that disk encryption on iPhone can be universally broken: to my (limited) understanding the key is derived from the passcode (& some SEP secrets), so it is at least as strong as the passcode

    Prikaži ovu nit
    Poništi
  8. 10. sij

    Today it took me 5 tries and various guessed workarounds to upgrade from 1809 to 1909, how do normal users even deal with this mess that is Windows 10

    Poništi
  9. proslijedio/la je Tweet
    7. sij
    Odgovor korisniku/ci

    extern "Rust"

    Poništi
  10. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  11. proslijedio/la je Tweet
    1. sij

    [NEW MUSIC] KJC Presents—KJC Anthem of the Decade (Feat. qwerty, YOLO Rhymes, goeo_, userlandkernel, ih8sn0w & lambda) LISTEN: [CLEAN] LISTEN: [EXPLICIT]

    Poništi
  12. 30. pro 2019.

    I feel dumber for having watched the last 3 episodes of Mr. Robot. What the hell was that

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    21. pro 2019.
    Odgovor korisniku/ci

    I hear for a brief second a standards committee member reached enlightenment and held the entirety of C++ in his mind for a second. Upon being reminded of his humanity, this forbidden knowledge was forever lost. Us programmers live in remembrance and aspiration of it.

    Poništi
  15. 19. pro 2019.
    Prikaži ovu nit
    Poništi
  16. 18. pro 2019.

    We're super curious to hear feedback from the community about how others tackled some of these issues.

    Prikaži ovu nit
    Poništi
  17. 18. pro 2019.

    I wrote a blog post about how we develop & run Ethereum smart contracts in production at . It turns out there are a lot of challenges with that, from debugging on the mainnet to identity management in a cloud world.

    Prikaži ovu nit
    Poništi
  18. 16. pro 2019.

    Can also be used as a straight sbx escape given a Spidermonkey bug: just set a malicious WPAD script via preferences, it will be executed in the UI process.

    Poništi
  19. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  20. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  21. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·