Tweetovi

Blokirali ste korisnika/cu @bi_ni_sh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bi_ni_sh

  1. proslijedio/la je Tweet
    17. stu 2019.

    On to part 2 in my series on AppLocker internals. This time I go into how AppLocker blocks process creation (or does it?), and some of the ways that you can opt-out of AppLocker if you're special enough.

    Poništi
  2. proslijedio/la je Tweet
    16. stu 2019.

    Published part 1 of a short series on AppLocker internals, no bypasses, just how the technology actually works on Windows 10 1909 and maybe some silly tricks along the way.

    Poništi
  3. proslijedio/la je Tweet
    9. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    7. stu 2019.

    Chrome: Site Isolation bypass and local file disclosure via Payment Handler API

    Poništi
  5. proslijedio/la je Tweet
    30. lis 2019.
    Poništi
  6. proslijedio/la je Tweet
    22. lis 2019.
    Poništi
  7. proslijedio/la je Tweet

    I gave talk about the future of Windows security at the summit on the Microsoft campus a few weeks ago. Video is up now, check it out:

    Poništi
  8. proslijedio/la je Tweet
    22. lis 2019.

    Maybe QL is interesting... Reported by Semmle Security Research Team [$15000][998431] High CVE-2019-13700: Buffer overrun in Blink. [$20000][1001503] High CVE-2019-13699: Use-after-free in media.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    ARM-X Architecture
    ARM-X Launcher Menu
    IP Camera "booted up"
    IP Camera Admin Interface
    Poništi
  10. proslijedio/la je Tweet
    20. lis 2019.

    I've just pushed a write-up describing the code, my original solution using modprobe_path and an alternative with a KASLR bypass and credential modification to . I'd love to hear if anyone used a different approach (or bugs!)

    Poništi
  11. proslijedio/la je Tweet
    9. lis 2019.
    Poništi
  12. proslijedio/la je Tweet
    10. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    5. lis 2019.
    Poništi
  14. proslijedio/la je Tweet
    27. ruj 2019.

    I contributed a kernel pwnable challenge to the r2con 2019 CTF organized by and . Unfortunately it went unsolved... I've pushed it to , and will later update source code and [even later] exploit. Let me know if you give it a try!

    Poništi
  15. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1164 (Windows 10 Kernel): Out-Of-Bounds Read\Write in the StrechBlt function in win32kfull.sys

    Poništi
  16. proslijedio/la je Tweet
    17. ruj 2019.

    Our overview of messaging apps security was used by in an article on Edward and why he is recommending Wire. Check it out :

    Poništi
  17. proslijedio/la je Tweet
    14. ruj 2019.

    Slides, scripts and installation details from my last night’s presentation about SSL/TLS crypto issues (POODLE, BEAST, CRIME etc) are finally available on my Github at Enjoy and let me know if you have any questions.

    Poništi
  18. proslijedio/la je Tweet
    12. ruj 2019.

    This is a pretty wild attack. Leveraging vectors in the SIM card to get location data, other information on targets. Because it's SIM card, its platform agnostic. Being used by a company that sells surveillance capabilities to governments

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    12. ruj 2019.

    xia0FridaScript - some useful frida script library for reversing and debug

    Poništi
  20. proslijedio/la je Tweet
    11. ruj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·