Laughing Bit

@laughing_bit

Born to code, live to hack. Fond of InfoSec, low level software and mirabelles. Author of , member of . Tweets are my tweets.

Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @laughing_bit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @laughing_bit

  1. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  2. proslijedio/la je Tweet

    I'm a big fan of and was excited when they asked me to appear in the series finale tonight.

    Poništi
  3. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  4. proslijedio/la je Tweet
    20. stu 2019.

    KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2 [SLIDES]

    Poništi
  5. proslijedio/la je Tweet
    19. stu 2019.

    Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.

    Poništi
  6. proslijedio/la je Tweet
    1. stu 2019.

    Want to win Pwn2Own without all the hassle of having to spend time finding bugs? We finally got round to sorting out and releasing Jandroid - a tool for helping to find logic bugs in Android apps (and just in time for next week!)

    Poništi
  7. proslijedio/la je Tweet
    9. stu 2019.

    I've published a write-up on the Android Binder use-after-free kernel bug that p0 discovered recently affected the Pixel 2 and Galaxy S7/S8/S9. It goes into technical details of how an arbitrary read/write is established :)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. lis 2019.

    While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization. I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:

    Poništi
  9. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi
  10. proslijedio/la je Tweet
    17. lis 2019.

    Please to announce Definitive Dossier of Devilish Debug Details – Part Deux of our PDB path research, where covers his journey into statistical analysis and approaches for general classification of PDB paths with respect to malware.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. lis 2019.

    The writeup and release is here! Tailoring CVE-2015-2215 to Achieve Root -

    Poništi
  12. proslijedio/la je Tweet
    14. lis 2019.

    From tweet to rootkit, our analysis by of a signed rootkit highlighted by : [EN] [FR]

    Poništi
  13. proslijedio/la je Tweet
    2. lis 2019.

    How a double-free bug in WhatsApp turns to RCE --

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    4. lis 2019.

    (a>>1)+(b>>1)+(a&b&1) This operation, that works out the average of two ints in a single instruction, was patented by Samsung. That patent expires today.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. ruj 2019.

    REVEN 2.2 is out! Python API, Automatic Recording, RE Automation and more... Details on

    Poništi
  16. proslijedio/la je Tweet
    18. ruj 2019.

    The second edition of Modern C is now available

    Poništi
  17. proslijedio/la je Tweet
    4. ruj 2019.

    TokyoWesterns CTF 2019- gnote writeup by pernicious

    Poništi
  18. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    Fuzzing is a powerful testing technique where an automated program feeds semi-random inputs to a tested program. The intention is to find such inputs that trigger bugs. Fuzzing is especially useful in finding memory corruption bugs in C or C++ programs.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·