Tweets

You blocked @andreyknvl

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @andreyknvl

  1. Retweeted
    6 Nov 2019

    How complicated is cellular baseband firmware? At least this complicated: over 150K debugging messages across 932 directories and 2,775 files! Rebuilding the source code skeleton from Samsung S10's Shannon S5000 baseband debugging messages.

    Show this thread
    Undo
  2. Jan 28
    Show this thread
    Undo
  3. Jan 28

    Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC

    Show this thread
    Undo
  4. Retweeted
    Jan 28

    My patch to disable PCI device DMA in early boot to avoid gaps in IOMMU coverage just got merged to mainline, so here's a writeup of it:

    Undo
  5. Jan 27

    Linux kernel 5.5 includes kcov extension that allows to collect code coverage from background kernel threads:

    Undo
  6. Retweeted
    Jan 27

    What I'm thinking reading this sad story of crit remote vuln introduced into all LTS kernels and still unfixed (now in your kernel)- this "forgot to release lock" is mostly solved problem today with static analysis. Kernel absolutely needs it as part of the dev process 1/n

    Show this thread
    Undo
  7. Jan 25

    Ported my old interactive USB keyboard script to the new FaceDancer, sent a PR: CC

    Undo
  8. Retweeted
    Jan 23

    Welcome changes for kernel: and the mailing list version for contrast: Gerrit has side-by-side diffs, full expandable context, non-lossy comments attached to lines. Here are docs:

    Show this thread
    Undo
  9. Retweeted
    Jan 22

    Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:

    Show this thread
    Undo
  10. Retweeted
    Jan 21

    I have so many questions right now. You know , right, the thing that runs the universe today? This FOU_ATTR_LOCAL_V6 wanted to say .len instead of .type: This means this thing never-ever worked in any way. Any attempt to pass these args would...

    Show this thread
    Undo
  11. Retweeted
    Jan 23

    ========================= The Life and Incredible Adventures of One QEMU Bug (Which I Finally Fixed) ========================= A thread [1/n]

    Show this thread
    Undo
  12. Retweeted
    Jan 21

    Week has passed... If you said 20+ you were right. 30 on dashboard (open+pending) My local instance has 70(!): All reachable by unpriv users That's not all. To find more we need to fix these first, otherwise it just keep crashing

    Undo
  13. Retweeted
    Jan 16

    Got an OOPS? Figured out the type in the variable causing the oops? Got the offset? Deep in a sub struct? Got you covered with a new EXAMPLE:

    Undo
  14. Jan 16
    Undo
  15. Retweeted
    Jan 16

    I'll make my tech report and poc public soon. It was a fun bug affecting most major distributions. one exploit to rule them all w/ all kernel expl mitigation bypasses - no rop chains / hardcoded crap

    Undo
  16. Retweeted
    Jan 15

    Brace yourselves, more netfilter bugs are coming! Bets on number of bugs in the first week

    Show this thread
    Undo
  17. Retweeted
    Jan 10

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Undo
  18. Jan 8

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Undo
  19. Retweeted
    Jan 7
    Undo
  20. Retweeted
    Jan 6

    New blog post. ARM hardware bug. In the specification.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·