Rezultati pretraživanja
  1. 1. velj
  2. 23. sij

    While you all were asleep I was turning CVE-2020-0601 into some trap music. Enjoy the demo track

  3. 22. sij

    Nice blog post from today promoting , "Detecting CVE-2020-0601 Exploitation Attempts With Wire & Log Data": via

  4. 21. sij
  5. Ho yes, unlike , it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. " , 9/10, will compile and link again"

  6. Because I prefer C, little POC to create your own EC alternative keys > With a lots of keys included in the release.

  7. 20. sij

    New video! Watch “CVEs in Windows Event Logs? What You Need to Know” and learn about important changes in the January 2020 Patch Tuesday associated with CVE-2020-0601. Please RT.

  8. 20. sij
  9. CVE-2020-0601脆弱性のチェックサイトがSANSから公開されてます 不正に署名したテストファイルも同サイトで公開されてますが、マルウェア検出の警告が出る場合もあるのでご注意を

  10. 19. sij

    .' Yara rule to catch CVE-2020-0601 matches about each 3 minutes in VT this morning. What an average! Mainly PoC with weaks detection rate:

  11. Because VBA is not all, with Microsoft PowerShell signed script. Very useful with AllSigned or RemoteSigned execution policy🤪

    Prikaži ovu nit
  12. 18. sij

    Super helpful presentation for people looking at possible uses: from

    Prikaži ovu nit
  13. 17. sij

    😱 We're beginning to see the true impacts of and I appreciate the deep challenges in layering the fixes as well as detection signals in all the places this can be applied.

  14. 17. sij

    I have added a Yara rule to detect explicit definition of some ECC orders in a binary: . Useful to detect .

  15. 17. sij

    1/ Insights from analyzing Chrome's patch for to protect Chrome's users on vulnerable unpatched machines

    Prikaži ovu nit
  16. 16. sij

    This is how behavioral engines deal with CVE-2020-0601

  17. 16. sij

    Write-CveEvent updated! get-help .\Write-CveEvent -Modified default message to more closely match CVE-2020-0601

    Prikaži ovu nit
  18. I've been getting asked about the "NSA Windows Bug" a lot so I'm just gonna post here. The vulnerability is *extremely* limited in scope - no RCE. It's related to Code Signing Certificates - how many of us use them as security boundaries? Likely zero.

    Prikaži ovu nit
  19. 16. sij

    And for the final thing - browsers will silently accept such certificates however IE will complain that the certificate could not be verified up to a trusted CA, but only when you view details!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.