K2

@ktwo_K2

K2 is a hacker geek, penetration specialist, professional world collider, a devil in the details

Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ktwo_K2

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ktwo_K2

  1. proslijedio/la je Tweet
    6. stu 2019.

    Talk done! If you have any more questions, and I will be seating at the burger joint just in front. We “heard” they serve pretty good cocktails as well... :)

    Poništi
  2. proslijedio/la je Tweet
    20. ruj 2019.

    (Tokyo Nov 6/7 2019) Presentation: A Survey of Programmable Software Security Assessment Frameworks for Vulnerability Discovery - Julien Vanegue () and Shane Macaulay (), Bloomberg

    Poništi
  3. 1. lis 2019.
    Poništi
  4. proslijedio/la je Tweet
    18. ruj 2019.

    I am delighted to announce that and I will be presenting at PacSec together next November in Tokyo. Shane and I have been working on scaling vulnerability discovery for almost 20 years and it’s time for us to share what we learned!

    Poništi
  5. proslijedio/la je Tweet
    27. kol 2019.

    InfinityHook is a pretty neat piece of software for Win10, allows you to hook syscalls, context switches, and many more kernel events using ETW via cc

    Poništi
  6. 22. kol 2019.
    Poništi
  7. proslijedio/la je Tweet
    20. kol 2019.

    Writeup for VM Escape found by our team member : In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!

    Poništi
  8. proslijedio/la je Tweet
    8. kol 2019.

    Check out my first blog post on how to start developing dynamic malware analysis tools with PANDA

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  10. 8. srp 2019.

    Undocumented MSVC flags to emit an AST. Handy for many purposes, right now I'm evaluating methods to compare front end AST output for equivalent representation when refactoring or lang-fuzzing.

    Poništi
  11. proslijedio/la je Tweet
    3. velj 2019.

    I am excited to announce that AFLSmart is released at . Another small disclosure :) today we get our first CVE of 2019 (CVE-2019-7314 in LIVE555 streaming server) for a vuln discovered by our recent work.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. srp 2019.

    UniTaint - A quick PoC I made last year to see if VMProtect is resistent to taint based attacks. Based on , BeaEngine and a custom tainter. Take it as it comes!

    Poništi
  13. proslijedio/la je Tweet
    4. srp 2019.

    I only wanted to check whether call gates still work on 64-bit x86. They do. (Why?) I ended up microbenchmarking and writing a blog post about system call entry/exit mechanisms on x86.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Today is day 91, so the issue is now public. I consider this relatively low severity, but you could take down an entire Windows fleet relatively easily, so it's worth being aware of.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    15. svi 2019.

    Project Zero's tracking sheet for zero-day exploits that were detected "in the wild":

    Poništi
  16. proslijedio/la je Tweet

    I finally wrote a small tool I've wanted for a long time: A parallel testcase minimizer. It's called halfempty, and I'm already finding it useful as part of my fuzzing workflow. /cc

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    A while back I prototyped a "Twitch plays binary exploitation" setup. Would anyone be interested in seeing this become a real thing? The general idea is that whatever people type in chat would get sent to stdin (one user at a time, with some kind of queue).

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    Ever wantted to snoop on the network traffic of like, one process? I wrote a script that helps you do that, thanks to Linux network namespaces:

    Poništi
  19. proslijedio/la je Tweet
    19. svi 2019.

    We drove the van down the day before, partly due to my fear of flying, partly to do early signals collection along the northeast corridor, and partly to make it to the NSA crypto museum :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·