clem

@clavoillotte

S-1-5-21*-512
Vrijeme pridruživanja: siječanj 2008.

Tweetovi

Blokirali ste korisnika/cu @clavoillotte

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @clavoillotte

  1. Prikvačeni tweet
    20. ožu 2019.

    An introduction to privileged file operation abuse on Windows Example bugs for McAfee, F-Secure and Pulse linked.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    i believe i just did something no one has ever done before: i wrote a constant-time galois field implementation on a 6502 chipset, which not only does not have a constant-time hardware multiply instruction, but does not have a multiply instruction at all

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  9. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    15. sij

    God forbid the Audit-CVE event fires for CVE-2020-0601 but if it does and the "para" field starts with 30, it's a good chance you have a cert with custom ECC curve params. Here's how you can parse them to make sense of them.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. sij

    [Blog] Avira VPN Local Privilege Escalation Uses some fun tricks to circumvent service DACL and integrity checks.

    Poništi
  12. proslijedio/la je Tweet
    14. sij

    The NSA advisory is much more helpful than Microsoft's.

    Poništi
  13. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  14. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Found this gem from about kerberos in .net Bonus: the KerbDump Tool to view the ticket and even decrypt its encrypted part. From what I understand from the code, Windows only - to confirm.

    Poništi
  16. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  17. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  18. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    18. pro 2019.
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.

    New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-)

    Poništi
  21. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·