ShaiHasarfaty

@hasarfaty

Principal Security Research Engineer @ Intel Security Trainer | Vulnerability Discovery | Exploit Development | Mitigations Development | Opinions are my own

Vrijeme pridruživanja: svibanj 2019.

Tweetovi

Blokirali ste korisnika/cu @hasarfaty

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hasarfaty

  1. Prikvačeni tweet
    3. sij

    The video of the talk we gave at Black Hat USA 2019 is now available on YouTube:

    Poništi
  2. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.

    Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.

    Poništi
  5. proslijedio/la je Tweet
    22. lis 2019.

    if one finds a bug in a stack buffer overflow but it's not exploitable due to stack canary/guard in place (statistical mitigation) , is it still eligible for security bug bounty or external bug bounty i.e.: ? how much will be paid for such report?

    Poništi
  6. proslijedio/la je Tweet
    25. stu 2019.

    Want to classify process injection by Windows API calls? Check out the new poster made by and me!

    Poništi
  7. proslijedio/la je Tweet
    24. velj 2019.

    The 6th part of the tutorial “Hypervisor From Scratch” is published. This part is about the essential things for "Virtualizing An Already Running System". Thanks to to make this part (like the other parts) possible.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  9. 28. stu 2019.

    Simple but effective!

    Poništi
  10. 13. stu 2019.

    Amazing effort through all teams in ! “67 of the 77 vulnerabilities we are addressing were internally found by Intel”

    Poništi
  11. 7. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    30. ruj 2019.
    Prikaži ovu nit
    Poništi
  13. 18. ruj 2019.

    The law is one thing, but being a human is above of any law... always remember the real things in life that are truly important...

    Poništi
  14. proslijedio/la je Tweet
    23. kol 2019.

    Apparently Intel is using a different Security Version Number for Trusted Computing Base (TCB, Key Gen) and FPF Anti-Rollback (ARB, Upgrade/Downgrade) at CSME >= 12 firmware. I thought it was the same before. Next version of ME Analyzer will show both.

    Poništi
  15. proslijedio/la je Tweet
    6. kol 2019.

    Intel, together with our customers and partners, is building the trusted foundation for computing in a data-centric world. Our commitment to

    Poništi
  16. 18. kol 2019.

    This is old and have many holes in the implementation but could be effective if done right... (hmm.. Let me see if I can do it as Xor-F-CFI)

    Poništi
  17. proslijedio/la je Tweet
    14. kol 2019.

    Thanks for explaining the CSME role in platform boot (and for clearing up some incorrect assumptions I made). For those interested, on knowing more about the CSME, see his + 's BH talk on the same:

    Poništi
  18. 11. kol 2019.
    Poništi
  19. proslijedio/la je Tweet

    We’re excited to head back to Las Vegas for two of our favorite events of the year: and . Our team will be giving a variety of talks and trainings, exploring all the latest trends.

    Poništi
  20. proslijedio/la je Tweet
    8. kol 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·