Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @assaf_carlsbad
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @assaf_carlsbad
-
About six months ago I signed up for a 10-day silent Vipassana course, but left on the 9th day with a bitter taste in my mouth. One day I'll write down my own negative experiences, but until I do I recommend reading this excellent write-up: https://medium.com/@meillind.parsoya.one/my-shortlived-stay-at-vipassana-meditation-center-dogmatic-pseudoscience-good-techniques-57a9a9ebab49 …
#notinfosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The case of KernelBase is even more interesting: its DllMain will be called, but with the arguments of DriverEntry. The crash is due to the fact that the GS segment register is interpreted differently. While in user-mode it points to the TEB, in kernel-mode it points to the KPCR.pic.twitter.com/hshjT9iQpN
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fun fact: you can load NTDLL as a driver and get yourself a nice BSOD. As it turns out, there is no flag in the PE header which differentiates user-mode binaries from kernel-mode binaries. Also, if the RVA for the entry point is 0, the loader will blindly jump into the MZ header.pic.twitter.com/kxBqicQZSL
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je Tweet
Just published a new research I worked on recently, documenting an undocumented kernel callbacks mechanism:https://medium.com/@yardenshafir2/yes-more-callbacks-the-kernel-extension-mechanism-c7300119a37a …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je Tweet
We added a couple of new mitigations to SKREAM - now it can randomize pool allocations by 3rd party drivers to break pool overflow exploits. Blog post to be published soon :)
@assaf_carlsbadhttps://github.com/Sentinel-One/SKREAM …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je Tweet
If you're too impatient to read the whole article, here's the repo with the code for pre-allocating and protecting memory pages used by some kernel exploitation techniques in Win7+8: https://github.com/Sentinel-One/SKREAM … Hopefully it'll contain more mitigations in the future.
@assaf_carlsbadHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je Tweet
Started playing with kernel-mode exploit mitigations together with
@assaf_carlsbad and eventually we came up with this new project: https://www.sentinelone.com/blog/skream-kernel-mode-exploits-mitigations-rest-us/ … This mitigation is only the first, there's more to come!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je Tweet
Now On Stage! Deep Hooks: Monitoring Native Execution In WOW64 Applications Yarden Shafir and Assaf Carlsbad SentinelOne researchers presented on BSidesTLV. Watch it now https://www.sentinelone.com/blog/now-stage-deep-hooks-monitoring-native-execution-wow64-applications/ …
#WOW64#injection#HeavensGate#sentinelone#DeepHooksHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
AV industry is like a circular linked list...pic.twitter.com/SMkGD8MGQp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Assaf Carlsbad proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.