laginimaineb

@laginimaineb

Tweets are my own (who else would write them?).

Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @laginimaineb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @laginimaineb

  1. proslijedio/la je Tweet
    6. velj 2018.

    Haha, I fucked up the link for the previous tweet. Here you all are:

    Poništi
  2. proslijedio/la je Tweet
    28. sij 2018.

    Exploring and Breaking Samsung’s TrustZone: a blog series Parts I-II-III

    Poništi
  3. proslijedio/la je Tweet
    24. sij 2018.

    Slides for my talk on Weird Machines and provable non-exploitability today in Oxford (more accessible than the paper):

    Poništi
  4. proslijedio/la je Tweet
    22. sij 2018.

    Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)

    Poništi
  5. proslijedio/la je Tweet
    20. sij 2018.

    jamais vu - a 1.0.0 TrustZone code execution exploit for the Nintendo Switch:

    Poništi
  6. proslijedio/la je Tweet
    20. sij 2018.

    Catch a live demo of a chosen-plaintext attack, exploiting a logical vulnerability in one of Windows' more common protocols, that enables remote code execution. Briefing by

    Poništi
  7. proslijedio/la je Tweet
    17. sij 2018.

    The technical details of a working remote exploit for pixel, , Thanks for the generous of Google, it's a Pleasant cooperation with android security team,

    Poništi
  8. proslijedio/la je Tweet
    10. sij 2018.

    I can finally efficiently (fast) and reliably (no errors) read paged pool/non-L1 data. Time for MeltiKatz/MimiDown. I’ll sit on this a few weeks before setting the world on fire and watching it burn. Or probably someone will do it first 🔥

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    First of a few remote code execution flaws in various popular torrent clients, here is a DNS rebinding vulnerability Transmission, resulting in arbitrary remote code execution.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. sij 2018.

    Ready to be CHARMed? Our Corellium Hypervisor for ARM enables us to run virtual iPhones in the cloud with game-changing features like: - Run any version of iOS - On demand thread list & kernel backtrace - Optional jailbreak for any version - Web-based debugging - And much more!

    Poništi
  11. 10. sij 2018.

    Another fun Android privesc, allowing arbitrary service replacement (without racing)

    Poništi
  12. proslijedio/la je Tweet
    10. sij 2018.

    This video shows a attack on *uncached* data. The data is not in L1, not in L2, and not in L3 cache. That's what clflush does, it throws the data out of all caches. exploits a race condition and even for uncached data this race can be won.

    Poništi
  13. proslijedio/la je Tweet
    9. sij 2018.

    Releasing our PoC implementations for - - More to follow /cc

    Poništi
  14. proslijedio/la je Tweet
    9. sij 2018.

    The PoC code referenced in our recent blogpost about CPUs is public now:

    Poništi
  15. proslijedio/la je Tweet
    8. sij 2018.
    Odgovor korisniku/ci

    The ARM whitepaper says "It is believed that there are no implementations of Arm processors which are susceptible to this mechanism that also implement the Pointer Authentication Mechanism introduced as part of Armv8.3-A, where there are keys held in system registers."

    Poništi
  16. 8. sij 2018.

    Are there any ARM v8.3 CPUs that are susceptible to variant 3a? In theory, on those CPUs the pointer authentication keys can be read, right?

    Poništi
  17. proslijedio/la je Tweet
    8. sij 2018.

    Exploit source that accompanies the Project Zero WPAD blog post () was just released in . Please enjoy responsibly!

    Poništi
  18. 8. sij 2018.

    Another ashmem bug allowing inter-process munmaps (should also work from isolated_app)

    Poništi
  19. proslijedio/la je Tweet
    4. sij 2018.

    My new vuln CVE-2018-0743 in WSL was patched today && it's tweetable! int main(void) { int n = 0xaaaaaaa; void **p = calloc(n, 8); for (; n; --n) p[n-1] = ""; execv("", p); } Full exploit at

    Poništi
  20. proslijedio/la je Tweet
    3. sij 2018.

    Project Zero blog post: "Reading privileged memory with a side-channel" by Jann Horn () -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·