Mastho

@masthoon

Security Researcher

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @masthoon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @masthoon

  1. proslijedio/la je Tweet
    prije 4 sata

    This is what I've been working on recently. Together with the hardlink mitigation, they will mitigate >100 vulnerabilities we've received in the past year. Stay tuned.

    Poništi
  2. proslijedio/la je Tweet
    9. sij

    My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!

    Poništi
  3. proslijedio/la je Tweet
    8. sij

    [JOB] [FR] Nous sommes actuellement à la recherche de hunters ! Nous rejoindre c'est faire de la réponse à incidents, de la recherche de compromission et de la recherche et développement. Plus d'infos sur :

    Poništi
  4. proslijedio/la je Tweet
    2. sij

    Starting 2020 with a major website update @ and 3 new pwn challenges from & ! Enjoy!

    Poništi
  5. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  6. proslijedio/la je Tweet
    25. ruj 2019.

    Written a new blog in my Windows Exploitation Tricks series, how to spoof the named pipe client PID.

    Poništi
  7. proslijedio/la je Tweet
    8. kol 2019.

    Wow ’s BH talk regarding Outlook and Exchange attack surface is truly invaluable! .

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. lip 2019.

    Earlier this year I was interested to know more about the "Hypervisor Platform APIs" () and so I wrote pywinhv: . It is pretty dead for now but might be a good learning resource for some people :)

    Poništi
  9. proslijedio/la je Tweet
    3. lip 2019.

    My Slides about Event Tracing for : "ETW for the lazy reverser" presented at . The code is based on the dev branch of PythonForWindows

    Poništi
  10. proslijedio/la je Tweet
    2. lip 2019.
    Poništi
  11. proslijedio/la je Tweet
    6. svi 2019.

    I wrote an exploit for CVE-2019-9810 to play with BigInts; you can find the sources here: 🍻

    Poništi
  12. proslijedio/la je Tweet
    19. tra 2019.

    Souhaitant revenir en France plus particulièrement en Bretagne, je suis ouvert à des opportunités d'emploi pour de nouveaux challenges, contact possible par MPs.

    Poništi
  13. 2. tra 2019.

    Just wrote my real first article on my blog (Cygwin sshd LPE): Exploiting a privileged zombie process handle leak on Cygwin

    Poništi
  14. proslijedio/la je Tweet
    19. ožu 2019.

    Another great blog post by and on leveraging Semmle QL for real-world vuln hunting. This one shows how they wrote queries that perform data flow & taint analysis to detect array indexing without bounds checks and path traversal issues

    Poništi
  15. proslijedio/la je Tweet
    11. ožu 2019.

    InSecurity organise pour la 5e année consécutive l'INS'HACK le 2 mai 2019. Si vous souhaitez devenir partenaire de cet événement (en tenant une conférence, en sponsorisant ou les deux), retrouvez plus d'informations ici :

    Poništi
  16. proslijedio/la je Tweet
    4. velj 2019.
    Poništi
  17. proslijedio/la je Tweet
    21. sij 2019.
    Poništi
  18. proslijedio/la je Tweet
    18. sij 2019.

    We've added report quality definitions to add clarity on what information we expect for each quality tier (Low, Medium, High) in the updated WIP bounty. Maximize your payouts and help us respond faster:

    Poništi
  19. proslijedio/la je Tweet
    4. sij 2019.

    Looking to hire a senior engineer to help build and lead a vulnerability research team focusing on key areas in Windows and Azure. Help make Microsoft products more secure by breaking them first! Position details at . Apply directly or DM me if interested.

    Poništi
  20. proslijedio/la je Tweet
    18. pro 2018.

    Fifty shades of UEFI: an initiation to SMM practices

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·