Georgios Baltas

@gebaltas

All things systems security. Member of the MSRC Vulnerabilities & Mitigations team. Opinions are my own.

Seattle, WA
Vrijeme pridruživanja: siječanj 2016.

Tweetovi

Blokirali ste korisnika/cu @gebaltas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gebaltas

  1. Prikvačeni tweet
    13. srp 2017.

    Interested in the exploits? I wrote a technical analysis of EternalSynergy:

    Poništi
  2. prije 4 sata

    This is what I've been working on recently. Together with the hardlink mitigation, they will mitigate >100 vulnerabilities we've received in the past year. Stay tuned.

    Poništi
  3. proslijedio/la je Tweet
    9. sij

    My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!

    Poništi
  4. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  6. 13. lip 2019.

    On my way to , if you want to chat about Windows/Hyper-V research or anything related to come say hi!

    Poništi
  7. 11. lip 2019.

    Great work and a lot of opportunity here, looking forward to seeing more external submissions

    Poništi
  8. proslijedio/la je Tweet
    15. svi 2019.

    Project Zero's tracking sheet for zero-day exploits that were detected "in the wild":

    Poništi
  9. proslijedio/la je Tweet
    17. tra 2019.

    [BLOG] Reverse-engineering Broadcom wireless chipsets by The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to we dont know what is vulnerable...

    Poništi
  10. proslijedio/la je Tweet
    28. sij 2019.

    As promised – part 2 of the Hyper-V series is here! Featuring our awesome friends from the Virtualization Security Team :) VMBus internals? vPCI guest-to-host vulnerabilities? Opensource tooling? We have it all!

    Poništi
  11. proslijedio/la je Tweet
    24. sij 2019.

    My first compiler optimization is now available in preview: using SSE2/AVX instructions to unroll memsets. We also have improvements to redundant store elimination thanks to and Shayne (not on Twitter) to help InitAll perf.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    21. sij 2019.

    If you wondered how defines Low, Medium, and High quality bounty reports, check out the updated definitions that put together. Let us know if you have questions or feedback :)

    Poništi
  13. proslijedio/la je Tweet
    21. sij 2019.
    Poništi
  14. 18. sij 2019.

    We've added report quality definitions to add clarity on what information we expect for each quality tier (Low, Medium, High) in the updated WIP bounty. Maximize your payouts and help us respond faster:

    Poništi
  15. proslijedio/la je Tweet
    17. pro 2018.

    and I will introduce some essential backgrounds of Hyper-V, how we build our fuzzer(the thing we call hyperseed) and what we get from it. The basic information we want to convey to you is that doing Hyper-V security research is not so hard as you imagined.

    Poništi
  16. 13. pro 2018.

    Pseudo-randomness for WinDbg, useful for MitM fuzzing: r $t1=((90a86a1b*@$t1)+$dbgtime)

    Poništi
  17. 10. pro 2018.

    If you’re interested in a systematic overview of modern fuzzing, this paper is a great read

    Poništi
  18. proslijedio/la je Tweet
    14. stu 2018.

    Please join the Windows kernel in wishing farewell to uninitialized plain-old-data structs on the stack. As of today's WIPFast build, any Windows code compiled with /kernel also gets compiled with InitAll, a compiler security feature that initializes POD structs at declaration.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    26. lis 2018.

    📢 Windows Defender Antivirus can now run in a sandbox! 📢 💥 First complete AV solution to have this capability 💥 This is a direct result of feedback that we received from the security industry. We encourage you to try this feature & give us feedback.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    I'm proud to announce we are, for the first time EVER, releasing official documentation which defines the criteria around security boundaries, features & mitigations in Windows: .

    Prikaži ovu nit
    Poništi
  21. 13. kol 2018.

    Great talk for anyone looking to get started on Hyper-V vulnerability research, check it out.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·