Aníbal Irrera

@airrera

Security Researcher & Software Developer at

Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @airrera

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @airrera

  1. proslijedio/la je Tweet
    4. velj

    Learn from the past to secure the future. At 2020 will explore Linux Kernel vulnerabilities and model the bug classes to avoid repeating the same mistakes

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Here's a cool trick to break out of AppLocker in Citrix environment: 1. Open a dummy RTF file in wordpad 2. Add ftp.exe as an object 3. Click to open ftp (or other similar apps) 4. ftp>!{commmand/app to run} for example: ftp>!cmd <-- blocked? ftp>!powershell <-- not blocked?:)

    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Apply for a position as a Senior Security Consultant with Immunity at our HQ in Miami, Florida or Arlington, Virginia.

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    Happy Birthday to IntelliJ IDEA! 19 today! We’re celebrating by giving away 1-year IntelliJ IDEA subscriptions to 19 lucky commenters. Use the hashtag and tell us when you started using IntelliJ IDEA!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    16. sij

    Reversing XignCode3 Driver – Part 2 – Analyzing init functions Part 2 is online! Understand how the Anticheat Driver inits some custom structures and variables that are later used to dispatch the different IOCTLs.

    Poništi
  8. proslijedio/la je Tweet
    8. sij

    First Active Attack Exploiting CVE-2019-2215 Found on Google Play, Linked to SideWinder APT Group -

    Poništi
  9. proslijedio/la je Tweet
    7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    Video of players using a new Fallout 76 exploit to steal player's item and spawn any item in game. It took 4 days to fix it to Bethesda. Here you have the original post on UC released the 10th of Dec. Patched the 18th.

    Poništi
  11. proslijedio/la je Tweet
    25. pro 2019.

    Want to learn how to create a Hardware Implant come to our talk “A Practical Recipe for Hardware Implants” at

    Poništi
  12. proslijedio/la je Tweet
    4. pro 2019.

    If you want to understand how this is possible, come tomorrow at Location: Room D Date: Thursday, December 5 | 10:45am-11:35am

    Poništi
  13. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    2. lis 2019.

    How a double-free bug in WhatsApp turns to RCE --

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    26. ruj 2019.

    66 GPS trackers. Wanna know what I found? Join me tomorrow 9:55am at to find out :)

    Poništi
  18. proslijedio/la je Tweet
    24. ruj 2019.

    Alguna vez vendiste algún dispositivo usado? Router, TV, o incluso un auto? Te preguntaste que info puede haber quedado aun después de un factory reset? Te invito el viernes 9.55am a ver mi charla en adonde vamos a hablar un poco sobre el tema

    Poništi
  19. proslijedio/la je Tweet
    20. ruj 2019.

    Nada de acostarse tarde el jueves eh! 😬

    Poništi
  20. proslijedio/la je Tweet
    17. ruj 2019.

    New blog post about our journey with Pebble templating engine and Server-Side Template Injection in it!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·