Andrea Allievi

@aall86

Currently Senior Windows Core OS Engineer, Windows Internals Enthusiast, tennis lover, currently working for MS. Opinions and tweets are my own.

Vrijeme pridruživanja: ožujak 2012.

Tweetovi

Blokirali ste korisnika/cu @aall86

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aall86

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. 3. velj

    Goodbye SCM. You are now in Chapter 10... A lot of new changes even there!

    Poništi
  3. 28. sij
    Poništi
  4. 23. sij

    A huge Goodbye to "\Pipe\Net\NtControlPipeX". We do not need it! XD <Spoiler alert>

    Poništi
  5. 15. sij
    Poništi
  6. proslijedio/la je Tweet
    8. lis 2019.

    Checkout the new version of IA32-VMX-Helper Now you can: - Apply proper symbolic constants and comments automatically - Search and explore MSR/VMCS by value or related Instructions in the IDA Gui!

    Prikaži ovu nit
    Poništi
  7. 29. pro 2019.

    Christmas vacation, last final chapter of the new Windows Internals... this work is taking tooo long. A new blog post is on-going too.

    Poništi
  8. proslijedio/la je Tweet
    20. pro 2019.

    Debugging Windows Server 2019 Hyper-V shielded guest OS using LiveCloudKd EXDi plugin (breakpoints and single-step operations while).

    Poništi
  9. 15. pro 2019.
    Poništi
  10. 13. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  12. 10. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi
  14. 19. stu 2019.

    Good introduction article by . Secure Launch is in the new Windows Internals book under its original name, Trusted Boot... A lot of "* Guard" in these days... my head is spinning :-)

    Poništi
  15. 17. stu 2019.

    My CPU is too fast for Sammy :-)

    Poništi
  16. 13. stu 2019.

    Interesting reading... use an emulator to emulate UEFI code...

    Poništi
  17. proslijedio/la je Tweet
    7. stu 2019.

    When mitigations happen to mitigate more than they were really intended to :) Great post about KVA shadow breaking some assumptions of kernel payloads

    Poništi
  18. 31. lis 2019.

    Naaahhhh I can't believe it.... Someone reversed my feature. Be ready, IBRS, IBPB, STIBP are coming too. I feel important now, thanks :-)

    Poništi
  19. 28. lis 2019.

    Ahahaha MiReloadBootLoadDriver... I guess who wrote that :-)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·