Ling

@ling_sec

Reversing, Malware Analysis, Shellcode Chef. I did that thing once.

Vrijeme pridruživanja: lipanj 2019.

Tweetovi

Blokirali ste korisnika/cu @ling_sec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ling_sec

  1. proslijedio/la je Tweet
    3. velj

    1/ Practically every startup ends up writing code, even if technology wouldn't be the main focus of the company. Here’s a checklist I made to help you and your hot new startup avoid the most common infosec pitfalls. [thread]

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    .Linux 𝗜𝗣: 217.182.38.147 Payload 𝗟𝗜𝗡𝗞: hxxp://217.182.38.147/GhOul.sh CnC Port: TCP/1111 𝗪𝗛𝗢𝗜𝗦: Country: FR / Currently 𝗔𝗰𝘁𝗶𝘃e

    , , i još njih 5
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I really liked this walk-through of writing code based signatures with YARA

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    Our research team just discovered a new campaign from . Tools were modified, shows that the Iranian government-backed group is doing an effort to evade future detection. Well.. they should try harder. Good job

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Twitter has a new security feature, if you tweet a password it put asterisks instead. Try it now ******

    Poništi
  7. proslijedio/la je Tweet
    12. sij
    Poništi
  8. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    ”The length of data to copy is calculated by substracting 4 bytes (length of action header) from length of action frame. But if the action frame only contains a header and the length of the header is only 3 bytes, the length to copy becomes 0xffffffff”

    Poništi
  10. proslijedio/la je Tweet
    30. pro 2019.

    Also while I am on twitter :P PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00. Uses bug from:

    Poništi
  11. proslijedio/la je Tweet
    26. pro 2019.

    New digital skimmer/ technique: steganography A colleague found this a couple of days ago while searching through our SIEM. The skimmer group uploads or modifies an existing image and appends the JS code. 1/5

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. pro 2019.

    If you ever wondered why 60 cards is the upper limit for YuGiOh! decks it's because someone once entered a tournament with a 2222 card deck with the intent of wasting as much time as possible by shuffling it frequently. These are pictures of the deckbox and list.

    Poništi
  13. proslijedio/la je Tweet
    18. pro 2019.

    NEW REPORT: botnet spreads headaches, cryptominers, and malware... This botnet is a relentlessly redundant attacker, targeting primarily Windows-based servers hosting any of a variety of services: MySQL, MS-SQL, Telnet, ssh, IPC, etc.

    Poništi
  14. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. pro 2019.

    Hey, all! I just made this neat little python script. It takes an arbitrary piece of information about you and uses it to calculate which Pokemon you'd be! How fun! You should all try it out and see what Pokemon you are. It's fun!

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    We present TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at

    , , i još njih 3
    Poništi
  17. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  18. proslijedio/la je Tweet
    9. pro 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    28. stu 2019.

    Deep dive analysis of Emotet - Includes breakdown of how the malware generates its filename using the volume serial number of the infected machine and a list of of pre-configured strings.

    Poništi
  20. proslijedio/la je Tweet
    26. stu 2019.

    (1/2) Here is my analysis of Tencent's Legu: Most of the analysis was done thanks to open source tools: - Frida (devkit) for hooking - QBDI (AArch64) for memory traces and instruction traces - Kaitai struct for reverse engineering the custom formats

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·