Tweetovi

Blokirali ste korisnika/cu @ga1ois

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ga1ois

  1. 2. pro 2019.

    The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .

    Poništi
  2. proslijedio/la je Tweet

    Nice detailed write up on some different ways to perform kernel heap spray to exploit BlueKeep. Missed a much easier way though :p

    Prikaži ovu nit
    Poništi
  3. 29. kol 2019.

    A blog post about how to write data into the kernel with RDP PDU. It can be and not only can be used for BlueKeep exploit.

    Poništi
  4. 5. srp 2019.

    I guess there are more those interesting PDUs existing, what kind of PDUs did you use? 😀

    Poništi
  5. 5. srp 2019.

    bitmap cache, refresh rect and client name request are interesting PDUs, some of them can allocate a huge pool, some of them can be sent for multiple times legitimately, some of them can allocate controllable size pool with controllable data.

    Poništi
  6. 29. svi 2019.

    CVE-2019-0708 seemed like a IcaDereferenceChannel double free at the first glance and then a IcaBindChannel out of boundary write at the second glance, but in fact it is a dangling pointer UAF(MCSPortData) at the third glance. (copy from Sixty Million Dollar Man😋)

    Poništi
  7. 6. srp 2018.
    Poništi
  8. 22. lip 2018.
    Poništi
  9. 31. svi 2017.

    Turn off your smart card redirection for the Terminal Service (RDP) on Windows XP and 2k3.

    Tweet je nedostupan.
    Poništi
  10. 18. ožu 2014.

    My slides at CanSetWest2014: "The Art of Leaks: The Return of Heap Feng Shui".

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·