Eloi Benoist-Vanderbeken

@elvanderb

Enthusiast reverse engineer of obfuscated and protected binaries. Exploit things .

France
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @elvanderb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @elvanderb

  1. proslijedio/la je Tweet
    26. sij

    AV stands for: Additional Vulnerabilities

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. sij
    Odgovor korisniku/ci

    I always see techniques I develop show up in public some years later :) Happens all the time. I’ve come to learn that no matter how cool you think your research is - someone else is probably, or already has, done the exact same thing.

    Poništi
  4. proslijedio/la je Tweet
    14. sij
    Poništi
  5. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  6. proslijedio/la je Tweet
    16. pro 2019.

    Happy ninjas, season's greetings! 🎄🎅

    Poništi
  7. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  8. proslijedio/la je Tweet

    I don’t endorse the vocabulary in this tweet but I’d like to share our side of things and perhaps set the records straight. We never really wanted to (and still don’t want to) discredit Dragos publicly, there is really no point. 1/x

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    My vote for most underrated and unused Linux/Unix command goes to column: mount VS mount | column -t

    Poništi
  10. proslijedio/la je Tweet
    16. stu 2019.

    Brief review for Day 1: 20 demonstrations, with 13 being successful, 5 teams gained bonus. 6 targets were taken down , , , PDF Reader, , , + qemu-kvm Come back tomorrow at 9am!

    Poništi
  11. proslijedio/la je Tweet
    16. stu 2019.

    A look inside Raspberry Pi hardware decoders licenses by ! That’s on page 43 of !

    Poništi
  12. proslijedio/la je Tweet
    11. stu 2019.

    Holy shoot, this is why MIDIServer is now sandboxed!

    Poništi
  13. proslijedio/la je Tweet
    8. stu 2019.

    LOAD DATA LOCAL strikes again with help of , this time in nodejs' mysql package 🧐

    Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.

    [PoC] CVE-2019-11932 Whatsapp 2.19.216 Remote Code Execution 1. set the listner ip (nc -lvp 5555) 2. run ./exploit and save the content to .gif 3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    29. lis 2019.

    Do you need to display unhandled Virtual Machine Extensions (VMX)? Here is port of dj_vmx_intrinsics to IDAPython:

    Poništi
  16. proslijedio/la je Tweet
    5. kol 2019.

    Here are the slides for my RECON and BlackHat presentation, "Automation Techniques in C++ Reverse Engineering":

    Poništi
  17. proslijedio/la je Tweet
    28. lis 2019.

    With a publication from on exploiting privesc CVE-2018-4193 on MacOS [in French 🇫🇷].

    Poništi
  18. proslijedio/la je Tweet
    26. lis 2019.

    "Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation", by Sebastian Poeplau and , to appear at ACSAC 2019 Compares KLEE, S2E, angr, and Qsym

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. lis 2019.

    How a Binder security feature breaks ACL in the Hardware ServiceManager (by ):

    Poništi
  20. proslijedio/la je Tweet
    14. lis 2019.

    Nice work from : Scraps of Notes on Exploiting EXIM Vulnerabilities gives an overview on Exim internals from the exploitability point of view and notes on exploiting EXIM vulns along w/ the PoC.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·