sinn3r

@_sinn3r

Animal lover. Vulnerability Research Consultant. Ex Lead Security Engineer at (Rapid7). Exploit-DB & Corelan.

ATX
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @_sinn3r

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_sinn3r

  1. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. sij

    Mini pro-tip for Java reversing: JD-GUI is my preferred decompiler if I want to attach a debugger since it preserves line numbers. CFR tends to provide much more reasonable code output, especially when dealing with inner classes, but doesn't fix up line numbers for debugging.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Here's your chance to hear tell the story of MS08-067 and finding exploits in crash reports :) And in case you missed the blog post he published a while ago:

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  5. proslijedio/la je Tweet
    21. stu 2019.

    In 2018 i was expelled from uni coz i was unable to pay my fee ( $4000/year + $500 monthly expenses) , and had some financial problems from family. helped me alot and paid uni fee. and now i am independent 🤓 And now i can become a Doctor 🙃

    Poništi
  6. proslijedio/la je Tweet
    15. lis 2019.

    I just released my slides from "Postscript Pat and His Black and White Hat" Still waiting on fixes from but so far 70+ bugs have been patched.

    Prikaži ovu nit
    Poništi
  7. 12. lis 2019.

    Sourcetrail (free) is a fun tool that saves lots of time in vuln research. Works even better w/ an IDE connected. E.g., this is CVE-2019-14776: Casually solved in seconds vs grep + noting where things are in mins.

    Poništi
  8. 19. kol 2019.

    ... If you have a pet and work hard, do me a favor, try to take them for a walk, play w/ them, pet them more often. One day you will never have that moment again, and there's no amount of money you've made can get that back.

    Prikaži ovu nit
    Poništi
  9. 19. kol 2019.

    My dog Missy passed away on 8/9/19. Infosec is a tough job, and I used to spend a lot of overtime working instead of spending time with her, but she was always with me. Now when I get on my work laptop, I turn around, that familiar sight of her resting is no longer there...

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    7. kol 2019.

    Attacking Unmarshallers :: JNDI Injection using Getter Based Deserialization Gadgets thanks to for the inspiration!

    Poništi
  11. proslijedio/la je Tweet
    5. kol 2019.

    Another good post on the technical details of the CapitalOne breach: I had missed the details about S3:Sync permission enabling the full download of data (I had assumed it was extra Read permissions). Subtle.

    Poništi
  12. 25. srp 2019.

    Spoiled by source code. And I love to be spoiled.

    Poništi
  13. proslijedio/la je Tweet
    18. srp 2019.

    Just sent this zero-day to :->

    Poništi
  14. proslijedio/la je Tweet
    27. lip 2019.

    Semmle is looking for full time Security researchers to help us secure open source projects. (Tambien en Latinoamerica!)

    Poništi
  15. proslijedio/la je Tweet

    If you are documenting or blogging, can you PLEASE follow Wikipedia's model and add links to documentation for *every* *single* *thing* you assume the reader knows about? Going from n00b to 1337 is so much easier if one doesn't have to look things up manually.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    Odgovor korisniku/ci

    Btw, as far as I can tell LFH applies also for kernel pool allocations from Win 10 v1809. Compared with v1803, there is a clear difference about how objects are allocated. Speaking from an exploit perspective that required modification because of that.

    Poništi
  17. 21. lip 2019.

    Unsure if this is how other exploit devs do it haha, but here's a Math.sin("hello world") debugging message trick for WinDBG + x64 Firefox: bu xul!js::math_sin "r $t0=poi(r8+10) & (0n140737488355328-1); .printf \"[Message] %ma\\n\", $t0+8; g"

    Poništi
  18. 20. lip 2019.

    This is kind of silly... but I have never successfully installed WinDBG Preview. 😕

    Poništi
  19. proslijedio/la je Tweet

    We’ll be teaching the new 2019 version of windows heap exploit class in the US in September. Open for registration:

    Poništi
  20. 12. lip 2019.

    Heap Overflow Exploitation on Windows 10 Explained (with info leak & code execution examples):

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·