Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @laginimaineb
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @laginimaineb
-
laginimaineb proslijedio/la je Tweet
Haha, I fucked up the link for the previous tweet. Here you all are:https://gist.github.com/SciresM/d31aa89f46a8ab18345b56fbeb3cebc9 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Exploring and Breaking Samsung’s TrustZone: a blog series Parts I-II-III https://medium.com/taszksec/unbox-your-phone-part-i-331bbf44c30c …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Slides for my talk on Weird Machines and provable non-exploitability today in Oxford (more accessible than the paper):https://docs.google.com/presentation/d/1lfQGEX2aGEA1H7flsXw4V30ZkbnrfikYk9IrctuwZO8/edit?usp=sharing …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)https://alephsecurity.com/2018/01/22/qualcomm-edl-1/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
jamais vu - a 1.0.0 TrustZone code execution exploit for the Nintendo Switch:https://www.reddit.com/r/SwitchHacks/comments/7rq0cu/jamais_vu_a_100_trustzone_code_execution_exploit/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Catch a live demo of a chosen-plaintext attack, exploiting a logical vulnerability in one of Windows' more common protocols, that enables remote code execution.
#BHASIA Briefing by@romanblachman http://ow.ly/y0IC30hTOu7Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
The technical details of a working remote exploit for pixel, https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html …, Thanks for the generous of Google, it's a Pleasant cooperation with android security team,
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
I can finally efficiently (fast) and reliably (no errors) read paged pool/non-L1 data. Time for MeltiKatz/MimiDown. I’ll sit on this a few weeks before setting the world on fire and watching it burn. Or probably someone will do it first
pic.twitter.com/iLQOezrPV7Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
First of a few remote code execution flaws in various popular torrent clients, here is a DNS rebinding vulnerability Transmission, resulting in arbitrary remote code execution.https://github.com/transmission/transmission/pull/468 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Ready to be CHARMed? Our Corellium Hypervisor for ARM enables us to run virtual iPhones in the cloud with game-changing features like: - Run any version of iOS - On demand thread list & kernel backtrace - Optional jailbreak for any version - Web-based debugging - And much more!pic.twitter.com/zGGHVh8RNQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Another fun Android privesc, allowing arbitrary service replacement (without racing)https://twitter.com/ProjectZeroBugs/status/951154829824577536 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
This video shows a
#Meltdown attack on *uncached* data. The data is not in L1, not in L2, and not in L3 cache. That's what clflush does, it throws the data out of all caches.#Meltdown exploits a race condition and even for uncached data this race can be won.https://twitter.com/misc0110/status/951015199292755968 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Releasing our PoC implementations for
#Meltdown - https://github.com/iaik/meltdown - More to follow /cc@misc0110@lavados@StefanMangard#intelbug#kaiser#kptiHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
The PoC code referenced in our recent blogpost about CPUs is public now: https://bugs.chromium.org/p/project-zero/issues/detail?id=1272 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
The ARM whitepaper says "It is believed that there are no implementations of Arm processors which are susceptible to this mechanism that also implement the Pointer Authentication Mechanism introduced as part of Armv8.3-A, where there are keys held in system registers."
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Are there any ARM v8.3 CPUs that are susceptible to variant 3a? In theory, on those CPUs the pointer authentication keys can be read, right?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Exploit source that accompanies the Project Zero WPAD blog post (https://googleprojectzero.blogspot.ch/2017/12/apacolypse-now-exploiting-windows-10-in_18.html …) was just released in https://bugs.chromium.org/p/project-zero/issues/detail?id=1383 …. Please enjoy responsibly!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Another ashmem bug allowing inter-process munmaps (should also work from isolated_app)https://twitter.com/ProjectZeroBugs/status/950330223937097728 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
My new vuln CVE-2018-0743 in WSL was patched today && it's tweetable! int main(void) { int n = 0xaaaaaaa; void **p = calloc(n, 8); for (; n; --n) p[n-1] = ""; execv("", p); } Full exploit at
@bluehatil https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2018-0743 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
laginimaineb proslijedio/la je Tweet
Project Zero blog post: "Reading privileged memory with a side-channel" by Jann Horn (
@tehjh) - https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.