Taha Ibrahim Draïdia

@ibrahimdraidia

Hacker at interested in reverse engineering, binary exploitation, exploit development and web application security.

EIP
Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @ibrahimdraidia

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ibrahimdraidia

  1. proslijedio/la je Tweet
    1. velj

    Myself and are off to USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    And next up to the have Taha talking about Kubernetes for pentesters! 👍

    Poništi
  3. proslijedio/la je Tweet
    15. sij
    Poništi
  4. proslijedio/la je Tweet
    12. sij

    Looks like I got the whole BlockDLLs thing working in C#. Quite a trivial exercise thanks to 's example in C:

    Poništi
  5. proslijedio/la je Tweet
    10. sij
    Poništi
  6. proslijedio/la je Tweet
    10. sij

    This was a really interesting bug and really good work by to exploit it... Perl 😱😱😱

    Poništi
  7. proslijedio/la je Tweet
    6. sij

    Adding CVE to muted words, FFS 🤦‍♂️

    Poništi
  8. proslijedio/la je Tweet
    14. velj 2019.

    I get asked all the time how to get started in binary RE. There are tons of great resources out there, so #1 is just get started with something, anything! But if you're open to suggestions for building a strong, general reverse engineering foundation, here are my suggestions:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    4. sij

    DropBox privilege escalation in Windows using hardlinks. Great read and great research by !

    Poništi
  10. proslijedio/la je Tweet
    21. pro 2019.

    Last project of 2019. I created an image-based C2 channel proof of concept that posts/retrieves stego'd images on Imgur. As a PoC only, I've simulated a proper implant in Python. The Framework is called Dali, after the artist. For fun & to learn!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    6. ruj 2019.

    Ghidra's decompiler is written in C++, hence it was trivial to implement a full integration. The new version of Cutter is shipped with a new plugin we wrote for Cutter and . NO JAVA INVOLVED. You can find the plugin and more info here --> >>

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    19. pro 2019.

    Bypass SSL Pinning and intercept HTTPS with Burp with apk-mitm - A CLI application that automatically prepares Android APK files for HTTPS inspection

    Poništi
  13. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  14. proslijedio/la je Tweet
    11. pro 2019.

    Qualys Security Advisory - Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726) < Beautiful! Wonder how found it?

    Poništi
  15. proslijedio/la je Tweet
    5. pro 2019.

    "A remote attacker can access vulnerable services with any password by entering the username as "-schallenge" or "-schallenge: passwd" bc a dash (-) before username tricks OpenBSD into interpreting the value as a command-line option and not as a username."

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. pro 2019.

    My first article on antivirus, detailing a bunch of issues rendering its web protection component ineffective. There will be more interesting findings to publish later.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi
  18. proslijedio/la je Tweet
    22. stu 2019.
    Poništi
  19. proslijedio/la je Tweet
    21. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    10. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·