Tweetovi

Blokirali ste korisnika/cu @fdfalcon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fdfalcon

  1. Prikvačeni tweet
    2. velj 2018.

    I wrote "Reverse Engineering the Win32k Type Isolation Mitigation", about how Windows 10 1709 changed the way SURFACE objects are allocated to kill Bitmap-based kernel exploitation techniques:

    Poništi
  2. proslijedio/la je Tweet
    3. sij

    I am collecting examples of “orgs saved *thanks to something failing*” Ex: NotPetya not wiping DCs in Africa thanks to a power outage @ Maersk RTs, Examples and links highly appreciated.

    Poništi
  3. proslijedio/la je Tweet
    3. sij

    Zer0Con2020 [Call for Papers] is open for top-notch speakers! Zer0con focuses on finding, analyzing, and exploiting vulnerability. Please refer to our website for more info! CFP deadline: 25th Feb, 2020 Zer0Con: 16~17 April, 2020

    Poništi
  4. proslijedio/la je Tweet
    30. lis 2019.

    SSTIC 2020 aura lieu du 3 au 5 juin, à Rennes. L'appel à soumissions est en ligne : . Date limite : 2 février 2020. Vous hésitez ? Relisez nos conseils :

    Poništi
  5. 30. lis 2019.

    "The vulnerabilities would have been ideal for hackers looking into hijacking the pet feeders into an IoT DDoS botnet" :)

    Poništi
  6. proslijedio/la je Tweet
    24. lis 2019.

    [BLOG] Analysis of Qualcomm Secure Boot Chains Nice work by Elouan during his internship: congrats :)

    Poništi
  7. proslijedio/la je Tweet
    14. lis 2019.

    The talk that and I did at CppCon on killing uninitialized memory vulnerabilities is online now: Hopefully folks enjoyed watching it because I enjoyed giving the presentation😃.

    Poništi
  8. proslijedio/la je Tweet
    8. lis 2019.

    Windows Error Reporting privilege escalation (CVE-2019-1315) Fixed in October updates

    Poništi
  9. proslijedio/la je Tweet
    10. lis 2019.

    Quarkslab internships season is now open: Want to have fun with development, reverse, crypto, static and dynamic analysis, emulation, unpacking? Read the post, apply, join, and we will both learn a lot.

    Poništi
  10. 4. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    18. kol 2019.

    Feliz cumpleaños a la lista crackslatinos cumplimos 19 años desde el 2000 estamos ayudando y compartiendo conocimiento. Felicidades a todos los que están o estuvieron y compartieron conocimiento o les sirvió para mejorar.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. kol 2019.

    Microsoft released fixes today that include fixes for wormable RCE vulnerabilities Remote Desktop Services (RDS), affecting all in-support versions of Windows (i.e from Windows 7 through to Windows 10, including server versions). More details here.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    15. srp 2019.

    [BLOG] CVE-2018-6924: FreeBSD ELF Header Parsing Kernel Memory Disclosure by

    Poništi
  14. 15. srp 2019.

    I wrote about CVE-2018-6924, a FreeBSD kernel memory disclosure vulnerability affecting the code that parses the ELF header of a binary prior to its execution:

    Poništi
  15. proslijedio/la je Tweet
    4. srp 2019.

    The slides for my talk about Hexagon and aDSP are (finally) available at

    Poništi
  16. proslijedio/la je Tweet
    28. lip 2019.

    Si vous voulez en apprendre plus sur l'exploitation de vulnérabilités sous Windows, ça se passe par là, avec et le CVE-2018-0977, une EOP dans le noyau. Enjoy :)

    Poništi
  17. proslijedio/la je Tweet
    9. svi 2019.
    Poništi
  18. 9. svi 2019.
    Poništi
  19. proslijedio/la je Tweet
    6. svi 2019.

    I also took the chance to analyze all kernels starting with Windows NT4, and created a chart showing the progression of the syscall table sizes between 1996-2019 in visual form. Actually seeing the bigger picture of a ~2.5x growth is quite fascinating/scary.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    30. tra 2019.

    Remote Code Execution on most of all Dell machines

    Poništi
  21. proslijedio/la je Tweet
    24. tra 2019.

    As diff based analysis is pretty useful in reverse engineering, here is the first part of a blog post series from : Nice work !

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·