Emanuele Cozzi

@invano

phd - malware&reversing

Francia
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @invano

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @invano

  1. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    -- Just found out the zine is out! Look out for a paper on modern ELF infection techniques with SCOP binaries.

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  4. proslijedio/la je Tweet
    23. sij

    The Security Circus 2019 update is now online:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    13. sij
    Poništi
  6. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  7. proslijedio/la je Tweet
    5. sij

    I made an experimental x86 bootloader using for BIOS boot. This program can boot the ELF formatted kernel which compressed with bzip2. it decompresses the bz2 image and relocate the ELF image, then boot the kernel.

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  10. proslijedio/la je Tweet
    20. pro 2019.

    Good tip of my colleague: This is how you can recognize 64 bit code wrongly interpreted as 32 bit code. It has lots of dec eax instructions because 0x48 is also used to signify 64 bit operand size. (32 bit interpretation is first picture, 64 bit second)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    17. pro 2019.

    I am glad to announce that we released the source code of KARONTE at . Our tool tracks information data-flow across the different components of a firmware and finds vulnerabilities. Our paper can be found at

    Poništi
  12. proslijedio/la je Tweet
    17. pro 2019.
    Odgovor korisnicima

    Heap disclosure in Windows libc for effectively forever. Reachable from some scripting languages too by using a similar code pattern:

    Poništi
  13. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  15. proslijedio/la je Tweet
    14. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.

    I’ve been saying they deserve a since a long time… Here’s another one! Local Privilege Escalation in OpenBSD’s dynamic loader (CVE-2019-19726)

    Tweet je nedostupan.
    Poništi
  17. proslijedio/la je Tweet
    2. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    29. stu 2019.

    This. Also, if someone wants to add new target devices avatar2, please reach out to me. I'm more than happy to give pointers on how to improve the framework. Lastly, here is a link to its sorce: :)

    Poništi
  19. proslijedio/la je Tweet
    14. stu 2019.

    Wrote a shared library injector (i.e. DT_NEEDED infect) that comes with a simple keylogger. Keyloggers are awesome.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    I am starting a new thing named Research Notes, which is the open source fraction of my research notebook on systems internals, vulnerability discovery and exploit development: And the first Research Note: “iBoot address space”

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·