Daniel Teixeira

@iKuppudotcom

Computer & Network Security Professional. My tweets are my own and not the views of my employer.

::1
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @iKuppudotcom

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @iKuppudotcom

  1. 2. velj

    MoveKit: Cobalt Strike kit for Lateral Movement by ⁦

    Poništi
  2. 30. sij
    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  4. 21. sij

    “... remember, I know where you live and I know you're on your own I may forget, I don't forgive ...” ?

    Poništi
  5. 14. sij
    Poništi
  6. proslijedio/la je Tweet
    8. sij

    Reversing XignCode3 Driver – Part 1 – Identifying the Driver Entry Point A mini-series of blog posts about XingCode 3. It should be a good way to jump into Windows Driver reversing if you haven't done it before :)

    Poništi
  7. 7. sij
    Poništi
  8. proslijedio/la je Tweet
    20. pro 2019.

    Wrote an exploit based on 's Symantec LPE writeup: (still half-drunk, so no warranty...)

    Poništi
  9. 26. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    24. stu 2019.
    Odgovor korisnicima

    That's why I keep my own repo of threat intel reports.

    Poništi
  11. proslijedio/la je Tweet

    Windows isn't a favorite feature, but details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)

    Poništi
  12. 16. stu 2019.
    Poništi
  13. 9. lis 2019.
    Poništi
  14. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  15. 3. lis 2019.

    Google will store all your passwords for free! So will I, just DM your passwords!

    Poništi
  16. proslijedio/la je Tweet
    3. lis 2019.
    Poništi
  17. 30. ruj 2019.
    Poništi
  18. proslijedio/la je Tweet
    13. ruj 2019.

    "Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    14. kol 2019.

    Videos of leHACK have been released and I am happy to share this with you all. My talk on Windows Kernel Exploitation starts at 01:38:38 - Cc:

    Poništi
  20. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·