Luca Marcelli

@layle_ctf

aka Layle. CTFs . HackTheBox Top 10. Reverser/Pwner. Windows kernel hacker. Heap lover. Learning crypto. 🇨🇭🇮🇹

Internet
Vrijeme pridruživanja: veljača 2018.

Medijski sadržaj

  1. 28. sij

    One of my secret goals for 2020 was to reach 1000 followers on Twitter.. Thanks to many people I had the chance and support to achieve double of my goal in the first month of the year! This tweet is a massive thank you to everyone that stuck with me and helped me along the way :)

    Prikaži ovu nit
  2. 26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
  3. 25. sij

    How to crash a Remote Desktop Gateway in 21 lines of clean Python code.

  4. 24. sij

    I'm patchdiffing CVE-2020-0609 and CVE-2020-0610 and my first thought is "how did this even work in the first place"

  5. 15. sij

    Abusing CVE-2020-0601 to get a message across... jk, I hate Ghidra :)

    Prikaži ovu nit
  6. 15. sij

    Update on CVE-2020-0601, got the TLS interception working :) MiTM with a trusted certificate is pretty nice. It worked just fine in Edge, but had to do some debugging to get it to work in Chrome. Firefox next? Sorry for stealing your idea again

  7. 15. sij

    Here's a picture of CVE-2020-0601, don't forget to patch! Took some inspiration from :)

    Prikaži ovu nit
  8. 14. sij

    What I did for debugging is: Spin up x64dbg with sigcheck.exe and debug your way through WinVerifyTrust (wintrust.dll).

    Prikaži ovu nit
  9. 14. sij

    Unfortunately the event logger catches now exploitation attempts, that is on patched versions of course.

    Prikaži ovu nit
  10. 14. sij

    They imported lots of new functions and made a couple new ones.

    Prikaži ovu nit
  11. 14. sij

    The diff is really small so there's not too much too look for. Check these functions.

    Prikaži ovu nit
  12. 14. sij

    That's the juicy part. It gets called from ChainGetSubjectStatus. How do you call this? Just check the signature of a binary using sigcheck for example. There's a whole bunch of other execution paths, but this should get you started ;)

    Prikaži ovu nit
  13. 14. sij

    CveEventWrite("[CVE-2020-0601] cert validation"); Looks like Microsoft didn't forget to feed the exploit into the EventLogger :)

    Prikaži ovu nit
  14. 14. sij
    Prikaži ovu nit
  15. 14. sij

    Really can recommend diaphora when patchdiffing things, like windows updates ;)

    Prikaži ovu nit
  16. 13. sij

    Many people ask me how I learnt C. I'll tell you my secret:

  17. 8. sij

    This is why I want to move to Australia

  18. 6. sij

    "Please close 'Generic Hacking Tool' before you start the game"

    Prikaži ovu nit
  19. 1. sij
  20. 31. pro 2019.

    The past few months were a blast :) I've been playing CTFs almost every week and I'm super happy to be able to see some progress already. Thanks for playing along and sticking with them team ;)

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·