Aleksei

@hellman1908

Crypto / CTFs / etc. Researcher at CTF team MSLC

Somewhere
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @hellman1908

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hellman1908

  1. Prikvačeni tweet
    2. velj

    I am starting a blog. First post is about the StarkWare Hash Challenge

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    This news reminds me of the European Space Agency in saying that "human beings" usually cannot "access flying spacecraft" so "there is no need for side channel attack protection". Serious attackers build machines to carry out attacks beyond human ability.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Kali Linux 2020.1 is out while the non-root user so you can use it as a daily driver if you want plus Nethunter for Android with no need to root you phone

    Poništi
  6. proslijedio/la je Tweet
    28. sij
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    A photo is a mathematical representation of your face.

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    New cache attack against Intel CPUs:

    Poništi
  9. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. sij
    Poništi
  11. 19. sij
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    My writeup for the "Out of the Sbox" crypto challenge at Teaser 2020: a key-recovery attack on a custom 7-round Feistel cipher with 2 known plaintexts.

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Poništi
  14. proslijedio/la je Tweet
    17. sij
    Poništi
  15. proslijedio/la je Tweet
    16. sij

    To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    16. sij

    If you DON’T give your new vulnerability a spicy name, everyone else will try to do it for you, and 2 years from now nobody will remember if “Chain Of Fools” is the same bug as “CurveBall” or “Who’s Curve”. The lesson is obvious.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. sij

    The NSA immediately prior to hitting the submit button to report CVE-2020-0601:

    Poništi
  18. proslijedio/la je Tweet
    14. sij

    It is hard for me to think, off the top of my head, of a major crypto vulnerability in the last several years that wasn’t covered in Cryptopals challenges — today’s included: it’s in Set 8! Donations to flip the House funded it!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. sij

    MIP* = RE, by Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, Henry Yuen: . There is a multiple-entagled-quantum-provers proof system for the Halting Problem, and Connes' Embedding Conjecture is false.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·