Ivan Fratric

@ifsecure

Security researcher at Google Project Zero. Tweets are my own.

Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @ifsecure

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ifsecure

  1. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Our research on Safari's Intelligent Tracking Prevention (ITP) is now available on cc

    Poništi
  3. proslijedio/la je Tweet
    9. sij
    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Quick reminder that we're still updating the "0day detected in-the-wild" spreadsheet here: . The first entry for 2020 is now in the books -- CVE-2019-17026 is a type confusion issue in the JIT engine for Firefox, detected in active attacks by Qihoo 360 ATA.

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    7. sij

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    Kudos to the GPZ team for their willingness to explore new vulnerability disclosure policies in addition to doing great research :) At the risk of wading into a disclosure debate (plz no), I think these policy changes will help improve customer safety

    Poništi
  8. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  11. 16. pro 2019.

    A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.

    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    Project Zero blog: "SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4" by Ned Williamson () --

    Poništi
  13. proslijedio/la je Tweet
    1. lis 2019.

    New video! I'm talking with the bug bounty hunter about a vulnerability he found in Google Cloud Shell. And the funny part is, Google even sponsored the video :D

    Poništi
  14. proslijedio/la je Tweet

    IE: Use-after-free in JScript arguments during toJSON callback

    Poništi
  15. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    I presented about Site Isolation in Google's event called 🙂 / "The world of Site Isolation and compromised renderer" Slide: Video:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    18. stu 2019.

    Here’s probably my favorite XSS of this year :) This is why we love legacy browser features like DOM Clobbering ;)

    Poništi
  18. proslijedio/la je Tweet
    15. stu 2019.

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    7. stu 2019.

    Chrome: Site Isolation bypass and local file disclosure via Payment Handler API

    Poništi
  20. 30. lis 2019.

    Oh look, dangling terrorism and pedophilia to justify what is ultimately used for human right violation. It's not like we ever heard that one before. 🙄

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·