Bryan Alexander

@dronesec

researcher. exploit dev.

Seattle, WA
Vrijeme pridruživanja: lipanj 2012.

Tweetovi

Blokirali ste korisnika/cu @dronesec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dronesec

  1. proslijedio/la je Tweet
    28. sij

    Some things make more sense when one realizes that there are at least 5 distinct security communities: Security product people (people that view security as something that can be added by buying/selling products), Security Infrastructure people (people that view security as ...

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  3. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.

    New WinDbg Preview rolling out! Biggest addition - a new timelines window for visualizing when things like exceptions, memory accesses, breakpoints, and function calls occur in your trace. Also quick at-a-glance tooltips for each event just by hovering!

    Poništi
  5. proslijedio/la je Tweet
    16. stu 2019.

    Published part 1 of a short series on AppLocker internals, no bypasses, just how the technology actually works on Windows 10 1909 and maybe some silly tricks along the way.

    Poništi
  6. proslijedio/la je Tweet
    2. ruj 2019.
    Poništi
  7. 22. kol 2019.
    Poništi
  8. proslijedio/la je Tweet
    14. kol 2019.

    and I just pushed our BlackHat 2019 slides here: Outlook and Hyper-V exploits on the menu!

    Poništi
  9. proslijedio/la je Tweet
    13. kol 2019.

    Uploaded the slides for my WOOT'19 talk. Thanks and for inviting me. If you're doing offensive research, I encourage you to submit your work to WOOT next year. It's great!

    Poništi
  10. 12. kol 2019.

    Code execution via fiber local storage (FLS); couldn't find any prior work, but seems like it should exist already?

    Poništi
  11. 16. srp 2019.

    Quick shoutout to // for their phenomenal call gate work from years yonder. They are supremely useful for picking apart LDT/GDT and

    Poništi
  12. proslijedio/la je Tweet
    1. srp 2019.

    My pup Marshall getting his hack on

    Poništi
  13. proslijedio/la je Tweet
    22. lip 2019.

    Just uploaded the pdf slides of my talk "whoami /priv"

    Poništi
  14. 14. lip 2019.

    "We were reluctant to implement it in the past because it required huge source code refactoring." What a terrible, terrible excuse. I'm glad we have undo now, but goodness.

    Poništi
  15. 6. lip 2019.

    Anyone seeing Windows 10 BSOD's related to Intel microcode updates? Have gotten them on 3 distinct machines so far in the last few days...

    Poništi
  16. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  17. 22. svi 2019.

    I spoke with a bunch of kids about hacking, it was fun

    Poništi
  18. proslijedio/la je Tweet
    22. svi 2019.

    MS finally fixed the "Diag Hub Collector" exploit on Win 10 1903

    Prikaži ovu nit
    Poništi
  19. 20. svi 2019.

    A completely portable virtual machine and programming language for red teaming; very impressive work from

    Poništi
  20. proslijedio/la je Tweet
    8. tra 2019.

    Call for One Page Articles for the 1st issue of Paged Out! zin! (it's a new free experimental deeply technical zin we're starting; it's about programming/security/hacking/demoscene/retro/electronics/etc) Details: Story: Please RT :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·