Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @hungtt28
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hungtt28
-
hungtt28 proslijedio/la je Tweet
New #fuzzing blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous@npmjs/@nodejs package using coverage-guided#javascript fuzzer.
Fuzzer: Jsfuzz by @fuzzitdev
Target: wasm-parser
Bug: DoS/OOM
https://webassembly-security.com/fuzzing-npm-nodejs-webassembly-parsing-library-with-jsfuzz/ …
#WeAssembly#js#wasm#NodeJSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:https://github.com/Microsoft/ApplicationInspector/wiki …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas
https://youtu.be/xfJeiteNOik Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
My first blog post on browser exploitation for
@infosectcbr. I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied. https://blog.infosectcbr.com.au/2020/01/firefox-spidermonkey-js-engine.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process. https://blog.jmpesp.org/2020/01/fuzzing-php-with-domato.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug: https://github.com/0vercl0k/stuffz/blob/master/CVE-2019-1184/CVE-2019-1184.cc …pic.twitter.com/Osr4Rk2V8z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....https://github.com/redogwu/pdf/tree/master/adobe …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Analysis of a Chrome Zero Day:
#CVE-2019-5786 https://www.terabitweb.com/2019/03/20/analysis-of-a-chrome-zero-day-cve-2019-5786/ … by@terabit7Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Slides + recording of my
#36c3 talk: https://saelo.github.io/presentations/36c3_messenger_hacking.pdf … https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage … had to omit many details, but blogpost coming soon!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
I blog about writing custom protobuf mutation routines for fuzzing: https://bshastry.github.io/2019/12/27/Custom-Proto-Mutation.html … Happy holidays and happy fuzzing! May you beat randomness with a custom mutation and find that elusive bug :-)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
I've implemented a fuzzer for PHP: https://github.com/nikic/PHP-Fuzzer … Fuzzing is a great way to find obscure bugs in parsing libraries...
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
[sqlite] Buffer Overflow bugs In Sqlite https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg118240.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
[CPR-Zero] CVE-2019-1286 (Windows Kernel): Null Pointer Dereference in the AlphaBlend function in win32kfull.syshttps://cpr-zero.checkpoint.com/vulns/cprid-2138/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.https://leucosite.com/Edge-Chromium-EoP-RCE/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Porting a JavaScript App to WebAssembly with Rust (Part 1) https://slowtec.de/posts/2019-12-20-porting-javascript-to-rust-part-1.html … a blog post that follows the progress of migrating a website (https://kartevonmorgen.org/ ) to Rust using the Seed (https://seed-rs.org/ ) framework
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
JavaScript fuzzing with libFuzzerhttps://github.com/guidovranken/libfuzzer-js …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug. http://bit.ly/38O65s0
#ZDITop5Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
In this blog, the
@payatulabs bandit explains what security issues could lead to a successful privilege escalation attack on any Linux based systems.#informationsecurity#cybersecurity#security#linux#privilegeescalation#infosechttp://bit.ly/2RYWWGZPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
hungtt28 proslijedio/la je Tweet
You have two weeks left to join our Capture the Flag contest and win a Nintendo Switch, or cool GitHub swag! Write a CodeQL query to find a specific class of DOM-based XSS vulnerabilities.https://securitylab.github.com/ctf/jquery
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.