Opens profile photo
Follow
Click to Follow JusticeRage
Ivan Kwiatkowski
@JusticeRage
Security Researcher. Maintainer of Manalyze, writer. Trolling on a purely personal capacity.
Franceblog.kwiatkowski.frJoined April 2014

Ivan Kwiatkowski’s posts

We created cheat sheets for IDA Pro and x64dbg for our online course recently, and were authorized to share them with everyone! The aim was to list all hotkeys that we use on a daily basis, i.e. only those we feel are worth learning. I hope you find them useful!
Image
Image
5
489
A lot of the value I bring to any company comes in the form of entertainment, specifically through an endless stream of salty emails. AI just made me obsolete. All hail our new robot overlords.
Image
8
315
An update to my 0day handling ethics mind-map for cybersecurity researchers. Version 1.0 did not account for the possibility of becoming accessory to murder. What a silly oversight on my part.
Image
5
246
Personal news: I have resigned from my position in 's GReAT team. I'm very grateful for my time there and everything the team accomplished. I don't have any reason to believe anything I wrote about the company was untrue at the time I wrote it. I will now take a… Show more
28
233
Not to bash on a single individual, which accomplishes nothing - but this is exactly why there is a need for more discussion about ethics in infosec. Take a minute to think about how your actions have impacted "human and women rights" and "free speech" in 2021.
Image
15
164
Okay Twitter 😶 Sorry non-French speakers, I can't translate this tweet considering how heinous it is. Imagine a hatred bingo combining the N-word, call for violence and nazism.
Image
16
154
I feel like there's a need to clarify what is going on here, it's an interesting anti-sandbox trick. The SeShutdownPrivilege string is constructed on the stack dynamically, in particular the program uses the first letter of its filename as an index in the string.
Quote
If you analyze HermeticWiper ( 61b25d11392172e587d8da3045812a66c3385451) and you are a beginner to malware RE, be careful to your sample name. Sometimes, it breaks or modifies the behavior of the malware. #HermeticWiper #malware
Image
1
124
I have stumbled onto something interesting while working on PE resource timestamps. It seems that a build chain, somewhere, is using local (non-UTC+0) timestamps for resources, which can help determine where the binary is compiled. Is this something known?
Image
2
106
This has to be the dumbest "forgotten password" form that was ever written. There aren't enough facepalm gifs in the whole Internet to convey how I feel.
Image
6
96
In the interest of supporting the discussion on the ethics of releasing PoCs for critical vulnerabilities, I created the following mind map. It is merely meant as a listing of the available options and associated consequences. No judgement intended.
Image
5
111
Our team has been investigating #LockerGoga and we can assess with medium confidence that it is linked to GrimSpider. We believe a Cobalt Strike / meterpreter combination is used during the post-exploitation phase. C2s use the default SSL certificate on port 443 ;)
5
92
Our reverse-engineering course has been out for a few months now, and the feedback is amazing :) If you haven't checked it out, there's IDA scripting, mock C2 development, hardcore deobfuscation and even Go. Feel free to DM me with any question! xtraining.kaspersky.com/courses/target
Quote
So after finishing another video from @kaspersky malware training, I've implemented the commands from Lazarus sample in the C2 emulator, it was pretty interesting learning about this topic, thanks to @JusticeRage for the extra exercise.
Image
3
96
To be fair, anti-cheat usually only has a single process to protect, which its developers fully own. EDR and endpoint solutions have to defend whole systems that they have zero control over, which is a much more difficult task. We welcome constructive feedback from game hackers!
Quote
bypassing anticheat is harder than bypassing EDR infosec is cucked by cheat engine users your entire industry is a joke
2
97
I hear a lot of people are looking for Pegasus samples. Dear , please buy the product, get all 0days patched, leak the tools and infra. Burn them to the ground and I swear I will never ever complain again about how my tax money is spent.
3
96
Alright. Is it maybe time to talk about using *local* password managers instead of cloud-based ones? Yes, they're better than no password manager, but come on. Don't trust anyone with such sensitive data as your passwords.
7
83
Dear , considering that you won't allow me to renew my licence, I'd appreciate it if you either: a) Granted me an OSS dev license, considering the value I bring to your customers for free b) Refrained from using my work for PR purposes Cheers
Quote
#Gepetto keeps the first position for the second month in a row! Good job @JusticeRage 👏 Got a plugin that could be on the top of the chart? Publish it, and let’s see 🌐 plugins.hex-rays.com//?utm_source=S #IDAPlugin #PluginRoundup #IDAPro #IDAPython
Plugin Repository Monthly Roundup: April 2023
5
81
I showed this tip to a friend today, and thought maybe it could be useful to other people. Problem: how to write Yara rules that match a given ASM snippet? Answer in three steps. 1) Open a random program with x64dbg. Break anywhere, entry point is fine.
Image
7
71
I'm very happy to share a project I've been working on for a long time now. A 🔥 scathing 🔥 three-part series on cryptocurrencies & NFTs. Part I: blockchains and crypto Part II: NFTs Part III: the politics of cryptocurrencies Part I was just released:
3
67
Very happy to share the results of a new investigation with and ! In this case, we talk more about the things we don't know than the things we do, which is a huge part of threat intelligence. I hope you enjoy the read!
1
64
Dear infosec community, this is the Jonathan Scott everyone is talking about right? I suppose I shall wear this as a badge of honor.
Quote
Replying to @JusticeRage @StopRusTrolls and 7 others
Bro…the fact that you used MVT-Tool shows that you literally know nothing about how to find malware on an iOS device.
Replying to
This is a follow-up of the last few days' experiments: twitter.com/JusticeRage/st I'm still figuring out exactly how much we can do here. There may be a way do do a decompilation plugin too, but it will require more work to integrate with IDA. I'll post more as I discover more!
Quote
Step 1: open a binary in IDA and press F5 Step 2: paste the decompiled code into OpenAI's chatbot Someone's job just got way easier.
Image
Image
1
41
Part II of my 🔥 series 🔥 on blockchains, cryptocurrencies and NFTs is now available! kaspersky.com/blog/crypto-ac In it, I discuss (rant about) Ethereum, NFTs, DAOs and digital ownership. I hope you enjoy it! There will be a final part in the coming weeks too.
4
36