Daniel King

@long123king

MSRC Security Researcher

Nanjing
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @long123king

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @long123king

  1. proslijedio/la je Tweet
    23. ruj 2019.

    For anyone looking for the secret sauce behind finding $40k bounty like the one found. Come to my talk this Thursday.

    Poništi
  2. proslijedio/la je Tweet
    5. ruj 2019.

    Attending later this month? You should definitely check out and Shayne's presentation on mitigating uninitialized use vulnerabilities :)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    31. svi 2019.

    Control-flow integrity nerds rejoice! 's BlueHat shanghai talk highlighted 's progress toward addressing the coarse-grained limitations of Control Flow Guard

    Poništi
  4. proslijedio/la je Tweet
    29. svi 2019.

    . just announced CFG 2.0 and new hardware security improvements at

    Poništi
  5. proslijedio/la je Tweet

    We're starting to finalize the schedule for BlueHat Shanghai next month, and are excited to announce that will be joining us there.

    Poništi
  6. proslijedio/la je Tweet
    10. tra 2019.

    Growing Hypervisor 0day with Hyperseed by and

    Poništi
  7. proslijedio/la je Tweet
    2. tra 2019.

    Just wrote my real first article on my blog (Cygwin sshd LPE): Exploiting a privileged zombie process handle leak on Cygwin

    Poništi
  8. 13. ožu 2019.

    BlueHat Shanghai 2019安全会议 演讲者可以选择使用中文演讲 现场提供中英文同声传译 CFP三月底截止 欢迎投稿和注册参与!

    Poništi
  9. 25. velj 2019.
    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. proslijedio/la je Tweet
    7. velj 2019.

    Great talk (as usual) from - Nowadays, if a vulnerability is exploited, it is most likely as a zero-day. Congratulations to & work with their team !

    Prikaži ovu nit
    Poništi
  12. 7. velj 2019.
    Poništi
  13. proslijedio/la je Tweet
    28. sij 2019.

    Interested in fuzzing Hyper-V virtualization service providers but not sure where to start? Here's an excellent blog post on how to do it and a sweet vulnerability we found while fuzzing.

    Poništi
  14. proslijedio/la je Tweet
    24. sij 2019.

    My first compiler optimization is now available in preview: using SSE2/AVX instructions to unroll memsets. We also have improvements to redundant store elimination thanks to and Shayne (not on Twitter) to help InitAll perf.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    18. sij 2019.

    We've added report quality definitions to add clarity on what information we expect for each quality tier (Low, Medium, High) in the updated WIP bounty. Maximize your payouts and help us respond faster:

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2018.

    Everybody knows researching Hyper-V is the most fun thing you can do, so I wrote a blog post about how to start doing just that! Let me know what you think && if you find any 0days of course :)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    14. kol 2018.
    Poništi
  18. proslijedio/la je Tweet
    13. kol 2018.

    Slides are up for the talk and me gave at BlackHat "A Dive in to Hyper-V Architecture and Vulnerabilities". The appendix documents API's, function signatures, and call stacks to hit the bugs we talked about!

    Poništi
  19. 30. svi 2018.

    This is a good opportunity to get insight into Hyper-V security, given by Joe and Nico.

    Poništi
  20. 19. svi 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·