Daniele Linguaglossa

@dzonerzy

Security guy, exploiter, infosec, geek

kernel
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @dzonerzy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dzonerzy

  1. proslijedio/la je Tweet
    29. sij
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    I'll make my tech report and poc public soon. It was a fun bug affecting most major distributions. one exploit to rule them all w/ all kernel expl mitigation bypasses - no rop chains / hardcoded crap

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet

    💥 Announcing iBootcamp, an online training camp to learn iOS security research. 🚀 Stage 0: Reconnaisance When: 12-21 December 2019 Where: online Registration: 📧 iboot@alisa.sh

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    6. stu 2019.

    After the release of Checkm8, hundreds (maybe thousands) of researchers globally didn't sleep much and basically looked like this. Getting into DFU hundreds of times is quite tiring but soon the sandbox will be forever free for most iPhones/iPads!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    25. lis 2019.

    Impressive: Someone wrote a compiler which compiles cheats (for Counterstrike) to use Return-oriented programming, only executing code that is already present in the machine's memory. This is done to try to bypass anticheat engines. Seen at

    Poništi
  7. proslijedio/la je Tweet

    V now has generics! You can check out the examples here:

    Poništi
  8. proslijedio/la je Tweet
    20. lis 2019.

    null-ptr-deref trigger in nfnetlink on upstream 4.4 kernels

    Poništi
  9. proslijedio/la je Tweet
    6. lis 2019.

    Want to find out how to exploit Just-In-Time compiler vulnerabilities like this? Join me at my OffensiveCon training in February and become an blackbelt in Browser Jiu JIT-su:

    Poništi
  10. proslijedio/la je Tweet
    2. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    30. ruj 2019.

    My writeups for all 12 challenges are now available:

    Poništi
  12. proslijedio/la je Tweet
    28. ruj 2019.
    Poništi
  13. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. ruj 2019.

    We are proud to launch our brand new interactive XSS cheatsheet featuring novel vectors from

    Poništi
  15. proslijedio/la je Tweet
    26. ruj 2019.

    So I am about 90 followers away from 10k... So decided to do a little give away when I hit the 10k mark. Anyone that shares this will be entered into a drawing, and I will give the winner (chosen randomly) a 1 year Burp Pro liscense.

    Poništi
  16. proslijedio/la je Tweet

    GO used to accept headers with a space before the colon, which may lead to some bypasses / request smuggling.

    Poništi
  17. proslijedio/la je Tweet
    24. ruj 2019.
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    20. ruj 2019.

    PuTTY (European Commission - DIGIT) disclosed a bug submitted by niky1235: - Bounty: $3,645.90

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·