Ferdous S

@malwarezoo

InfoSec Stuff. Tweets are my own.

Toronto, Ontario
Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @malwarezoo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @malwarezoo

  1. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    29. srp 2019.

    Hi Toronto and folks. We are currently looking to hire a FT/Non-remote N-Day Vulnerability Researcher ( ) and a Malware Researcher ( ) Please pass along and let me know if you have any questions :)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    It's very interesting watching all this drama in the media about FaceApp just because it's run by a company in Russia, yet no one has a problem uploading all their personal photos and videos to Twitter, Snapchat & Facebook.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    19. srp 2019.

    Yikes! “Since today all Internet providers in Kazakhstan started MITM on all encrypted HTTPS traffic. They asked end-users to install government-issued certificate authority on all devices in every browser.”

    Poništi
  5. proslijedio/la je Tweet
    29. tra 2019.

    It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop.

    Screenshot of front page of the Android app reversing workshop.
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. tra 2019.

    Facebook CTF 2019 is happening this June. I got to write one of the reversing challenges this time 😊

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    10. tra 2019.

    ICYMI - released a writeup for a new MacOS persistence technique using Folder Actions. Bonus: Apfell module also released to operationalize the technique. Check it out:

    Poništi
  8. proslijedio/la je Tweet
    10. tra 2019.

    New blog post: Some info about the upcoming C3X2019 this summer in Toronto FYI here’s 2017: and 2018:

    Poništi
  9. proslijedio/la je Tweet
    28. ožu 2019.

    Part 2 of my Heap Exploitation series is finished! ✨ Part 2: Understanding the Glibc Heap: Free, Bins, Tcache: In case you missed Part 1: Understanding the Glibc Heap - Overview and Allocation Strategies:

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    5. ožu 2019.

    Dropping the first part of the Heap Exploitation series today. The heap is a beautifully complex construct. Yet most heap exploitation tutorials assume it to be common knowledge, thus making it unnecessarily hard to understand. So I’ll start the series with an intro to the heap

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. velj 2019.

    State of the art of network protocol reverse engineering tools : (pdf)

    Poništi
  12. proslijedio/la je Tweet

    To all the people telling me this will never happen, and I should stop trash talking 2FA (TOTP, SMS, etc *not* U2F). Please read this, then kindly apologise.

    Tweet je nedostupan.
    Poništi
  13. proslijedio/la je Tweet
    10. pro 2018.

    Everybody knows researching Hyper-V is the most fun thing you can do, so I wrote a blog post about how to start doing just that! Let me know what you think && if you find any 0days of course :)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    21. stu 2018.

    Multiple 0days in MacOS discovered and used in a red team exercise at Dropbox

    Poništi
  15. proslijedio/la je Tweet

    Any need another? Recently unemployed and hungry for work. Canada / US remote or Victoria, BC local.

    Poništi
  16. proslijedio/la je Tweet
    8. lis 2018.

    Here are the slides and video for mine and 's presentation at : $SignaturesAreDead = "Long Live RESILIENT Signatures" wide ascii nocase Slides: Video:

    Poništi
  17. proslijedio/la je Tweet
    6. lis 2018.

    My write-up for the 2018 challenge ( all 12 levels ): Thank you & for creating and hosting such an amazing challenge this year. Also big thanks to and for helping me out. Till next year !

    Poništi
  18. proslijedio/la je Tweet
    16. kol 2018.
    Poništi
  19. proslijedio/la je Tweet
    19. lip 2018.

    redsnarf : a pen-testing / red-teaming tool for retrieving hashes and credentials from Windows workstations, servers and domain controllers : , More details :

    Poništi
  20. proslijedio/la je Tweet
    11. lip 2018.

    Here’s another great list if you’re looking for InfoSec Livestreams, Videos, Podcasts, Talks, Tutorials, and other useful learning resources. :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·