Lucas Leong

@_wmliang_

Play hard, Exploit hard

Taipei
Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @_wmliang_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_wmliang_

  1. Prikvačeni tweet
    15. velj 2019.

    source code of my old fuzzer, pe-afl, which applies static binary instrumentation, aka binary rewriting, on PE file

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi
  5. proslijedio/la je Tweet
    20. sij

    my new current project. automatic ropchain generation!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals.

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  10. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  11. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  12. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  14. 24. pro 2019.
    Poništi
  15. proslijedio/la je Tweet

    New blog with technical details of Chrome exploitation research from Windows OSR team

    Poništi
  16. proslijedio/la je Tweet

    In the final blog of our Top 5 bugs of 2019, details a privilege escalation via the core shell COM registrar object in .

    Poništi
  17. proslijedio/la je Tweet
    19. pro 2019.

    Happy to announce that our paper “Automatic Techniques to Systematically Discover New Heap Exploitation Primitives” got accepted , ! !

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  19. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.
    Odgovor korisnicima

    Heap disclosure in Windows libc for effectively forever. Reachable from some scripting languages too by using a similar code pattern:

    Poništi
  21. proslijedio/la je Tweet
    14. pro 2019.

    Pretty good workshop, describing Windows drivers DSE bypassing! It allows run LiveCloudKd with own hvmm.sys driver on Windows Server 2019 with Dec 2019 patches and Secure Boot enabled.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·