Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @eternalsakura13
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @eternalsakura13
-
sakura proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2020/01/chasing-polar-bears-part-2.html … Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
sakura proslijedio/la je Tweet
Check out
@Nosoynadiemas ' tips on Fuzzing, to overcome known challenges and maximize results:https://securitylab.github.com/research/fuzzing-challenges-solutions-1 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.https://support.apple.com/en-us/HT210919
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
AFLplusplus + libprotobuf-mutator https://github.com/thebabush/afl-libprotobuf-mutator/ …
#fuzzing#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
1001 Ways of Implementing a System Callhttps://x86.lol/generic/2019/07/04/kernel-entry.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
Assert yourself on the browser playground with
@mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
Congrats to our CTF winners! 1st place goes to
@paraschetal, with an impressive query, with tests and exploits! 2nd place goes to@Kachakil who took the time to give very detailed explanations. Well done guys! Hope you had fun! Solutions are coming soonhttps://securitylab.github.com/ctf/jqueryPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
Another "nice" kernel bug that literally allows to write any memory on the machine by any user (you just give kernel any exact physical or virtual address): https://syzkaller.appspot.com/bug?id=c173ad918406681bbb58281b0a9220b6504a4e29 … Again, killed before making it into any release: https://lkml.org/lkml/2020/1/8/216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
WeChat: Memory corruption in CAudioJBM::InputAudioFrameToJBM https://bugs.chromium.org/p/project-zero/issues/detail?id=1948 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
The README and various code comments hopefully also help explain how the PoC exploit works: https://bugs.chromium.org/p/project-zero/issues/detail?id=1917#c6 … and alsohttps://twitter.com/5aelo/status/1210695563185926145 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
For anyone interested in my presentation on Local RPC in .NET the HITB version is now up on YouTube.https://youtu.be/2GJf8Hrxm4k
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
I gave a lightning talk at the
#36c3 on PathAuditor: https://media.ccc.de/v/36c3-10524-lightning_talks_day_2#t=1162 … The main point I tried to make is that this bug class is fun to research and easy to find. If you've watched it, I'd love some feedback:https://c3lt.de/36c3/talk/93MFWV/feedback/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process. https://blog.jmpesp.org/2020/01/fuzzing-php-with-domato.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
I've just released ccrawl (http://github.com/bdcht/ccrawl ). Its a
#clang-based tool that allows to collect and query various properties of C/C++ data structures, and to translate them for example to ctypes (including on C++ class instances.)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
sakura proslijedio/la je Tweet
Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....https://github.com/redogwu/pdf/tree/master/adobe …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.