Andrzej Dyjak

@andrzejdyjak

Application Security. Low-level, clouds, and anything in-between.

Warsaw, Poland
Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @andrzejdyjak

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @andrzejdyjak

  1. proslijedio/la je Tweet

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Znamy nazwiska Prelegentów, którzy wystapią na ścieżce Innovation Labs na ! ☄️Bartłomiej Słota ☄️Paweł Skiścim ☄️Marcin Markowski ☄️Jakub Nabrdalik ☄️Andrzej Dyjak ☄️Artur Król Masz szansę stanąć u boku ekspertów! Wyślij 👉

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    After three years of preparation, our SAMM team has delivered version 2 of SAMM! More details here: A big thanks to our community, your feedback, corrections, questions, input, and encouragement. SAMM version 2 is for you!

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  5. 24. sij

    On a related note, to this day I’m a little bit sad every time I remind myself that Seven Pernicious Kingdoms by didn’t get traction and ultimately lost to Top 10.

    Poništi
  6. 24. sij

    I’ve been repeating this for years. Top 10 is not a tool that should be used for software security assessments, ASVS is. Top 10 is good as a library for (1) threat modeling sessions and (2) raising awareness for devs (even though it mixes up classes with particular vulns).

    Poništi
  7. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  8. 18. sij

    Excellent talk by about complexity, security, and what future may (or may not) bring 👉

    Poništi
  9. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  10. proslijedio/la je Tweet
    8. sij

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Poništi
  11. proslijedio/la je Tweet
    6. sij

    ( PL ) VIDEO from my PWNing2019 prelection - "0daying the 0day detection engine"

    Poništi
  12. proslijedio/la je Tweet
    4. sij

    Cool example of extending Domato to PHP

    Poništi
  13. 2. sij

    Bonus points for black swans (you know, like AFL for fuzzing field). Voice your opinion or at least share so I can get opinions of others. Kudos! 2/2

    Prikaži ovu nit
    Poništi
  14. 2. sij

    What events in your opinion were significant (i.e. moved the needle) in Cyber? e.g. Morris Worm, CodeRed/Nimda, Gates' TCM memo, Operation Aurora, Stuxnet, Shadowbrokers et al, Target & Equifax, Mirai & Internet Census, Heartbleed, Meltdown & Spectre, etc etc etc 1/2

    Prikaži ovu nit
    Poništi
  15. 27. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  17. proslijedio/la je Tweet
    25. pro 2019.

    Friends, I am very pleased to announce that I have managed to re-assemble the original 29a archives in totality. All zines are now present in what was once their original form. 1luv -smelly__vx

    Poništi
  18. proslijedio/la je Tweet
    20. pro 2019.

    My summary of the AWS re:Invent security related announcements:

    Poništi
  19. proslijedio/la je Tweet
    20. pro 2019.

    JavaScript fuzzing with libFuzzer

    Poništi
  20. proslijedio/la je Tweet
    15. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·