Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_wmliang_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_wmliang_
-
Prikvačeni tweet
source code of my old fuzzer, pe-afl, which applies static binary instrumentation, aka binary rewriting, on PE file https://github.com/wmliang/pe-afl
#BlueHatILHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.https://techcommunity.microsoft.com/t5/windows-kernel-internals/dtrace-on-windows-20h1-updates/ba-p/1127929 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
#idatips Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!pic.twitter.com/zvYs3dTU7w
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
As promised, a short post on Hyper-V admin privesc: https://decoder.cloud/2020/01/20/from-hyper-v-admin-to-system/ … /cc
@padovah4ck@mkolsekHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
my new current project. automatic ropchain generation! https://github.com/d4em0n/exrop pic.twitter.com/nkXB9FhUra
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674 https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200001 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals. https://twitter.com/yarden_shafir/status/1217728223355817986 …pic.twitter.com/rfFlA1aZXR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug: https://github.com/0vercl0k/stuffz/blob/master/CVE-2019-1184/CVE-2019-1184.cc …pic.twitter.com/Osr4Rk2V8z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. https://tyranidslair.blogspot.com/2020/01/empirically-assessing-windows-service.html … h/t
@cesarcerHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer https://andreafioraldi.github.io/articles/2019/12/20/sanitized-emulation-with-qasan.html … I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.https://leucosite.com/Edge-Chromium-EoP-RCE/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Lucas Leong proslijedio/la je Tweet
New blog with technical details of Chrome exploitation research from Windows OSR teamhttps://blogs.technet.microsoft.com/mmpc/2017/10/18/browser-security-beyond-sandboxing/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
In the final blog of our Top 5 bugs of 2019,
@HexKitchen details a privilege escalation via the core shell COM registrar object in#Windows.http://bit.ly/34ISBurHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Happy to announce that our paper “Automatic Techniques to Systematically Discover New Heap Exploitation Primitives” got accepted ,
@USENIXSecurity!#usesec20!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug. http://bit.ly/38O65s0
#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
In the 1st of our Top 5 bugs for 2019,
@hosselot takes a look at a sandbox escape in#Firefox originally submitted to the program by@_niklasb. Read the details at http://bit.ly/2M0XatD#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Heap disclosure in Windows libc for effectively forever. Reachable from some scripting languages too by using a similar code pattern:https://gist.github.com/gamozolabs/bef74c8aefc295e591514d97726d754e …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lucas Leong proslijedio/la je Tweet
Pretty good workshop, describing Windows drivers DSE bypassing! https://github.com/theevilbit/workshops/tree/master/DSE%20Bypass%20Workshop … It allows run LiveCloudKd with own hvmm.sys driver on Windows Server 2019 with Dec 2019 patches and Secure Boot enabled.pic.twitter.com/G70ZAU0j1l
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
