Alonso Candado

@alonsocandado

Security Software Engineer ,Security Researcher ,Reverse Engineer

Madrid
Vrijeme pridruživanja: veljača 2010.

Tweetovi

Blokirali ste korisnika/cu @alonsocandado

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alonsocandado

  1. 11. sij

    Interesting project to learn about OS internals and Rust: Writing an Os in Rust

    Poništi
  2. 8. sij

    I really enjoyed the talk from about anti-cheats, executing ring 0 code through GIGABYTE driver vulnerability: Unveiling the Underground World of Anti-Cheats

    Poništi
  3. 7. sij

    Nice writeup by about vulnerability in ws2ifsl.sys. The exploit bypass KASLR and KCFG.

    Poništi
  4. proslijedio/la je Tweet
    6. sij

    Learning about buffer overflows and using radare2 for basic debugging

    Poništi
  5. proslijedio/la je Tweet
    5. sij

    I made an experimental x86 bootloader using for BIOS boot. This program can boot the ELF formatted kernel which compressed with bzip2. it decompresses the bz2 image and relocate the ELF image, then boot the kernel.

    Poništi
  6. 4. sij

    Writing loadable Linux kernel modules in Rust.

    Poništi
  7. 28. pro 2019.

    This is the kind of content I like to read, especially at Christmas when I have time to dwell on the details. Good job.

    Poništi
  8. 14. pro 2019.

    Cool repo with a lot of resources to learn Rust:

    Poništi
  9. 19. stu 2019.

    Cool talk about how to secure kernel page table around virtualization and containers environments preventing that VMs and containers have visibility of the entire host kernel. Kernel Address Space Isolation:

    Poništi
  10. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    1. stu 2019.

    Retro shellcoding for current threats: rebinding sockets in Windows

    Poništi
  12. 25. lis 2019.

    Well done : "Semmle donated the overall awards ($95,000) to an unnamed organization, let’s remember that Google doubles the amount of bug bounty if the researchers donate them to a registered charity"

    Poništi
  13. 24. lis 2019.

    Technical analysis of the checkm8 exploit

    Poništi
  14. 21. lis 2019.

    Testing Code integrity guard with a simple injection works well, calling SeValidateImageHeader and returning 0xc0000428. By viewing the callstack is easy to think what happens if I try reflective injection? Code integrity guard is bypassed!!

    Poništi
  15. 4. ruj 2019.

    How to create the "perfect storm" developing windows drivers: - The driver is open to communicate to any arbitrary process - The transfer type is METHOD_NEITHER - No check buffers using ProbeForWrite or ProbeForRead

    Poništi
  16. proslijedio/la je Tweet
    22. srp 2019.

    Here's a Sandbox Escape + Local Privilege Escalation found I found in Comodo Antivirus (CVE-2019–3969). Features signed binary bypass, crashing services, and some COM.

    Poništi
  17. 20. srp 2019.
    Poništi
  18. 11. srp 2019.

    Lately I'm enjoying a lot reading tweets from and about bug hunting. Really useful tips.

    Poništi
  19. 10. srp 2019.

    Finally had time to watch 's talk : Developing Kernel Drivers with Modern C++. Very useful to improve your code developing windows kernel drivers.

    Poništi
  20. proslijedio/la je Tweet
    26. lip 2019.

    This is an excellent post explaining Sysmon internals, incl. Kernel Callbacks and Event Tracing. Also very useful for AV/EDR research :) Thnx for the tip 👍

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·