Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @alonsocandado
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alonsocandado
-
Interesting project to learn about OS internals and Rust: Writing an Os in Rust https://os.phil-opp.com/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I really enjoyed the talk from
@niemand_sec about anti-cheats, executing ring 0 code through GIGABYTE driver vulnerability: Unveiling the Underground World of Anti-Cheatshttps://youtu.be/yJHyHU5UjTgHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nice writeup by
@flxflndy about vulnerability in ws2ifsl.sys. The exploit bypass KASLR and KCFG.https://twitter.com/bluefrostsec/status/1214571356785917953?s=19 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
Learning about buffer overflows and using radare2 for basic debugging https://rderik.com/blog/understanding-buffer-overflows-using-radare2/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
I made an experimental x86 bootloader using
@rustlang for BIOS boot. This program can boot the ELF formatted kernel which compressed with bzip2. it decompresses the bz2 image and relocate the ELF image, then boot the kernel.#rustlang#bootloader#osdevhttps://github.com/ellbrid/krabsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Writing loadable Linux kernel modules in Rust.https://github.com/fishinabarrel/linux-kernel-module-rust …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is the kind of content I like to read, especially at Christmas when I have time to dwell on the details. Good job.https://twitter.com/0xrepnz/status/1210612570358464513 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cool repo with a lot of resources to learn Rust:https://github.com/ctjhoa/rust-learning …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Cool talk about how to secure kernel page table around virtualization and containers environments preventing that VMs and containers have visibility of the entire host kernel. Kernel Address Space Isolation:https://www.youtube.com/watch?v=rp_WawkcHeU&feature=youtu.be …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
Fixing Remote Windows Kernel Payloads to Bypass Meltdown KVA Shadow
#BlueKeep#EternalBlue https://zerosum0x0.blogspot.com/2019/11/fixing-remote-windows-kernel-payloads-meltdown.html …pic.twitter.com/OH9mPuBVMn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
Retro shellcoding for current threats: rebinding sockets in Windows https://www.shelliscoming.com/2019/11/retro-shellcoding-for-current-threats.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Well done
@Semmle : "Semmle donated the overall awards ($95,000) to an unnamed organization, let’s remember that Google doubles the amount of bug bounty if the researchers donate them to a registered charity"https://twitter.com/Dinosn/status/1187662459861114880 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Technical analysis of the checkm8 exploithttps://habr.com/en/company/dsec/blog/472762/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Testing Code integrity guard with a simple injection works well, calling SeValidateImageHeader and returning 0xc0000428. By viewing the callstack is easy to think what happens if I try reflective injection? Code integrity guard is bypassed!!pic.twitter.com/rcC2vao7IE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
How to create the "perfect storm" developing windows drivers: - The driver is open to communicate to any arbitrary process - The transfer type is METHOD_NEITHER - No check buffers using ProbeForWrite or ProbeForReadhttps://twitter.com/_r_netsec/status/1169282245464473601 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
Here's a Sandbox Escape + Local Privilege Escalation found I found in Comodo Antivirus (CVE-2019–3969). Features signed binary bypass, crashing services, and some COM. https://medium.com/tenable-techblog/comodo-from-sandbox-to-system-cve-2019-3969-b6a34cc85e67 …pic.twitter.com/u3svAlfdM0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Lately I'm enjoying a lot reading tweets from
@silviocesare and@nicowaisman about bug hunting. Really useful tips.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Finally had time to watch
@zodiacon's talk : Developing Kernel Drivers with Modern C++. Very useful to improve your code developing windows kernel drivers.https://www.youtube.com/watch?v=AsSMKL5vaXw&feature=youtu.be …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alonso Candado proslijedio/la je Tweet
This is an excellent post explaining Sysmon internals, incl. Kernel Callbacks and Event Tracing. Also very useful for AV/EDR research :) https://ackroute.com/post/2017/08/08/sysmon-enumeration-overview/ … Thnx
@alonsocandado for the tip
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

Here's the first one: Reversing AuxKlibQueryModuleInformation