-
First successful EMFI glitch on the stage
@offensive_con#offensivecon19 pic.twitter.com/V1nxUjYwOq
-
-
#offensivecon19 faulting bit on an ecc ram with a wire and a lighter. pic.twitter.com/Pf5LOf6Rfn
-
Here are the slides from my
#OffensiveCon19 talk about my approach for JavaScript engine fuzzing: https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf … My master's thesis (for which I developed the fuzzer) can be found here: https://saelo.github.io/papers/thesis.pdf … Thanks for the great conference@offensive_con! =)Prikaži ovu nit -
My
#offensivecon19 slides "Attacking Hardware Root of Trust from UEFI Firmware" released. More details about bypass Boot Guard implementation on Lenovo Thinkpad's coming after#BHASIA and#OPCDE2019. Enjoy evil SMI handlers over WMI and stay tuned!https://github.com/REhints/Publications/blob/master/Conferences/Bypassing%20Hardware%20Root%20of%20Trust/offcon2019_final.pdf … -
All Computrace options Enable/Disable/Permanent Disable implemented fully in software over SMM drivers with LenovoSecuritySmiDispatcher orchestration (presented on
#offensivecon19) Basically "Permanent Disable" option is a joke and can be reactivated any time. Stay tuned!#BHASIApic.twitter.com/8ZJneLw6So
-
Updated Analysis of PatchGuard on Windows 10 RS4 : following
#offensivecon19, my paper is out! https://blog.tetrane.com/2019/Analysis-Windows-PatchGuard.html … -
only few days after
#offensivecon19 : firmware extract. (cc@defane), emulation, fuzzing->1st#IoT stack based BoF triggered and it will not be the last one I think (NX only) thx@therealsaumil for the training :Dpic.twitter.com/eoj20Al03n
-
Following my
#offensivecon19 presentation, I just released the paper on Windows Defender ASR bypass on my blog (http://blog.sevagas.com/?Bypass-Windows-Defender-Attack-Surface-Reduction …) and on GitHub. I will not release more code samples than what is in the paper, I don't want to help ransomware writers! -
A bit late, but here are the slides from my talk “3D Accelerated Exploitation”. Thanks
@offensive_con for letting me do this cool thing.#offensivecon19 https://twitter.com/FSecureLabs/status/1098889546756997120 …Prikaži ovu nit -
Integer overflows in VirtualBox 3D Acceleration hate this guy https://labs.mwrinfosecurity.com/assets/BlogFiles/offensivecon-2019-3d-accelerated-exploitation-jason-matthyser.pdf … by
@pleasew8t#offensivecon19 -
I uploaded the slides I presented at
#offensivecon19 on github. https://github.com/sevagas/WindowsDefender_ASR_Bypass-OffensiveCon2019 … Paper coming soon! -
Some resources from
#offensivecon19 https://github.com/blankwall/Offensive-Con/blob/master/OffCon.pdf … https://github.com/bkth/Attacking-Edge-Through-the-JavaScript-Compiler/blob/master/pres.pdf … https://github.com/phoenhex/files/blob/master/slides/chrome_ipc_exploitation_offensivecon19.pdf … https://github.com/Synacktiv/CVE-2018-4193/ … https://github.com/mwrlabs/3d-accelerated-exploitation … (soon ?) -
I definitely confirm my opinion of last year, to me
@offensive_con is the best EU conference atm. Congrats again@bluefrostsec@yubiguel@LukasHermannBFS See you in 2020 for sure#OffensiveCon19 https://twitter.com/f_roncari/status/965250399287545856 … -
Soo,
#offensivecon19, 10/10, would do again! :D I felt very welcome. The atmosphere was super friendly in general + the technical level was very impressive. Many reached out, esp. the Organizers, but also attendees. I got included in conversations or offered a helping hand.Prikaži ovu nit -
Thank you everyone who supported us in this wonderful edition. We will be sending feedback forms over email in the coming weeks. Please take some time to fill them out.
#offensivecon19 -
#offensivecon19 summary: honor of shaking hands with@41414141, research idea from@sergeybratus, very 1st shell on a real world device thanks to@therealsaumil, this all with my#bff@_kylma who also helped me with the@Blackhoodie_RE dinner! Thanks to@offensive_con ! -
I've survived the Linux kernel exploit training by
@vnik5287 at@offensive_con I've never been so happy to pop a shell :D Highly recommended!#offensivecon19 pic.twitter.com/CDmrRyPuXW
-
Just a bunch of 0days in the Linux USB subsystem.
#offensivecon19 pic.twitter.com/Vnz5lq7YUr
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.