Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
I’ve taken a look, her brain basically kind of looks like thispic.twitter.com/fC5vVhHb1r
-
-
If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals. https://twitter.com/yarden_shafir/status/1217728223355817986 …pic.twitter.com/rfFlA1aZXR
-
Thanks to some amazing last-minute work by multiple teams, I'm happy to share that
@CrowdStrike Falcon detects exploitation attempts of CVE-2020-0601 and shows the Certificate Authority, SHA-1 of the malicious certificate, and ECC curve parameters. More details in our Tech Alertpic.twitter.com/EHYIVVG4c7
-
Been away for the last 4-5 weeks, good to know the latest MSRC case numbers and their fix status. Thanks, symbol files ;-)pic.twitter.com/oBiFBnMxKK
-
Feb 14 2019 was a very special night at least years OffensiveCon for me, set in motion a very well crafted plan, and directly impacted my keynote that morning. Exactly one year later, I hope everyone will attend this anniversary of Windows Internals revelry! https://twitter.com/offensive_con/status/1204729472370585600 …pic.twitter.com/Pt12HNSvQg
-
I have no idea how I ever made sense of things without
@yarden_shafir‘s diagramming skills. Also wow I’m sure there totally won’t ever be any missing CET validation paths ever found
pic.twitter.com/VWiG2NpYex
-
It's amazing to me that we're all willing to run everything from critical infrastructure to toasters on processors where the easily reverse-engineerable operating systems know secrets that the consumers/users/operators don't, but any sufficiently skilled nation state can infer.pic.twitter.com/BD5o56S16Q
-
Excited to watch the stream of
@OWASP_IL’s event at@Akamai where@yarden_shafir will be talking about all of the wonders of 3rd party AV hooking NTDLL and injecting unsafe DLLs all over the place!pic.twitter.com/hartNLJnzm
-
-
If you're still looking for bugs in win32k, user32, and gdi32, you're finding 2019's vulns.pic.twitter.com/wEjPt4QAnb
-
-
@yarden_shafir “NPIEP is a fun drinking game where you have to say ‘non privileged instruction execution prevention’ and get a shot if you get it right, then try again. RUM is what I wish I had this morning before talking about hypervisor mitigations”. Yep,#WindowsInternals.pic.twitter.com/RuWKtMMCEY
-
Sat down and learned some more ETW for the upcoming Windows Internals 7th Edition, Part 2 book, and ended up creating an ETW Based Hyper-V Hypervisor Call Tracer using new functionality in 20H1, including stack tracing and symbol resolution. No TDH, xperf or complexity.pic.twitter.com/DzqzymJkBy
-
#lit
: When your function prototype has more annotations than the function itself.pic.twitter.com/q17gXHm3rO
-
ExAllocatePool4ExWithSanityChecksQuotaPriorityTagNodeSpecialHeapAllTheThingsTheFinalAndBestToRuleThemAllpic.twitter.com/C6jyOnFKDs
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.