Gal De Leon

@galdeleon

Vuln research & exploit dev @ PANW. MSRC top 10 2018 & 2019

Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @galdeleon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @galdeleon

  1. proslijedio/la je Tweet
    prije 41 minutu

    Privilege escalations with WER and by exploiting file overwrites

    Poništi
  2. proslijedio/la je Tweet
    prije 19 sati

    The quote's missing the first part of the sentence: "like used to say.." :)

    Poništi
  3. proslijedio/la je Tweet
    prije 21 sat

    This is what I've been working on recently. Together with the hardlink mitigation, they will mitigate >100 vulnerabilities we've received in the past year. Stay tuned.

    Poništi
  4. proslijedio/la je Tweet
    5. velj
    Poništi
  5. 21. sij

    Excited to speak at about logical vulnerabilities I discovered in Windows Error Reporting 😀

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  7. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  8. proslijedio/la je Tweet
    18. pro 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    19. pro 2019.

    I really think the hardlink protection in windows needs back porting to all supported OSes. Surely cheaper than paying all the bounties. Make it happen 😉

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-)

    Poništi
  11. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  12. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  13. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    8. stu 2019.

    Released to go with my talk, a project which contains a C# client for almost every ALPC RPC server on Windows 7 through Windows 10 1909. Could be useful for EoP research, fuzzing etc.

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.

    Poništi
  16. proslijedio/la je Tweet
    2. pro 2019.

    The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .

    Poništi
  17. proslijedio/la je Tweet
    29. stu 2019.

    I wrote up my comments on the technical aspect of the WhatsApp Vs NSO lawsuit here

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. stu 2019.

    There is my writeup about my research on DsSvc. I finally got 4 CVEs on this service, all of them are easy to lead EoP. It is a really simple but long story lol😃😃

    Poništi
  20. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·