Faith

@farazsth98

Curtin University Undergraduate. Intern Security Researcher @ InfoSect. Browser Security Enthusiast. I rarely share my opinions on controversial topics.

Perth, Western Australia
Vrijeme pridruživanja: svibanj 2019.

Tweetovi

Blokirali ste korisnika/cu @farazsth98

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @farazsth98

  1. Prikvačeni tweet
    13. pro 2019.

    As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups. Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati
    Poništi
  3. 2. velj

    Just made a short blog post for on how pointer compression has been implemented in V8, and what it means from the perspective of an exploit developer. It's a fairly recent change that's only been mentioned in a chromium design document as far as I can see.

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Come join me and for “Linux Heap Exploitation” - a 4-day training at Singapore

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    oh you like windows internals? name every syscall

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    Reverse engineering is mostly about naming stuff

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    "Modern 0days - Browsers, JavaScript Engines, and JIT Compilers" - by

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  11. proslijedio/la je Tweet
    11. sij

    I published a write-up for md15 from 36C3 CTF:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    🎉 First security blogpost of 2020 🎉 Some people ask me, so here is how to start fuzzing APIs of JavaScript engines like Chrome/V8. In this blogpost, I'm using: ✅ Dharma/Domato ✅ Chrome/v8 ASan pre-built ✅ Honggfuzz ;)

    Poništi
  15. proslijedio/la je Tweet
    5. sij

    . just hired as its first employee. We'll be taking him on while he's at Uni, and he'll be doing an internship with us. He's a smart guy and I expect to see him do great things in the future. Here's one of his recent blog posts:

    Poništi
  16. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  18. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    26. pro 2019.

    Put together a post outlining some of 's Windows Defender recommendations and some other recommended settings from 's latest Windows 10 security baseline

    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.

    Simplest and strangest sandbox escape I've found in Chrome was just derestricted

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    15. pro 2019.

    HITCON CTF 2019 Final Score

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·