Jimmy Wylie

@mayahustle

Adversary Hunter at . Lead Analyst on TRISIS. Spend my days (and nights) searching for and tearing apart threats.

Baltimore, MD
Geregistreerd in april 2009

Tweets

Je hebt @mayahustle geblokkeerd

Weet je zeker dat je deze Tweets wilt bekijken? @mayahustle wordt niet gedeblokkeerd door Tweets te bekijken.

  1. heeft geretweet
    27 jun.

    Absolutely stoked to get published in PoC || GTFO, but all credit goes to for making it happen! He polished this ridiculous exploit and authored an equally funny write-up. Want to exploit 20yo software like a boss? Get your PoC here -->

    Deze collectie tonen
    Ongedaan maken
  2. 28 jun.

    On the plus side, sounds like a good research area. WASM disassembler anyone?

    Deze collectie tonen
    Ongedaan maken
  3. 28 jun.

    My heart goes out to colleagues working on web-based malware: "there are not many publicly available tools for analyzing Wasm binaries. Similarly, hardly any documentation exists on how to analyze a Wasm application at this time"

    Deze collectie tonen
    Ongedaan maken
  4. heeft geretweet
    27 jun.

    Want to run powershell without using powershell.exe! If your target have Microsoft SQL Server installed use sqlps.exe

    Ongedaan maken
  5. heeft geretweet
    27 jun.

    Some of the compiler-based security mitigations we've added in Android P

    Ongedaan maken
  6. 28 jun.

    Filed under: Reasons I dislike COM. No need to do DLL replacement+proxy. Just use an abandoned reference. Only difference is the attacker will have to load the DLL as opposed to it getting loaded by the owning program. Solid work.

    Ongedaan maken
  7. heeft geretweet
    28 jun.

    Slides from my talk “A Code Pirate’s Cutlass: Extracting Software Architecture from Embedded Binaries” (automated recovery of object file boundaries) are posted here:

    Ongedaan maken
  8. 27 jun.
    Ongedaan maken
  9. heeft geretweet
    27 jun.

    Concision is the most important skill in reverse engineering. Conveying only the details that matter, and their role in the bigger picture.

    Ongedaan maken
  10. 27 jun.

    Related to this idea of keeping your customers Q in mind, or maybe an effect of this? Analysis doesn't require starting at the top of the graph (i.e. Main). Instead, start at whichever point in the graph you think is most relevant.

    Deze collectie tonen
    Ongedaan maken
  11. 27 jun.

    This breakdown is on point and is applicable to much more than RE. -- Reminds me of advice I gave a student once: What does your customer need? Find it, interpret it and report it. Stop bathing in bits and move on.

    Deze collectie tonen
    Ongedaan maken
  12. heeft geretweet
    27 jun.

    Our network has been under sustained attack this morning. We are working with our upstream providers to mitigate the attack. Emails are delayed but will not be lost. Thank you for your patience.

    Ongedaan maken
  13. 27 jun.
    Ongedaan maken
  14. 27 jun.

    There aren’t a whole lot of us, so we can’t expect the folks who read or listen to our output to understand in the way we do. Frankly, it’s the most challenging part of this gig and why cons like are so nice. You can remove the filter and be with your own kind (3/3)

    Deze collectie tonen
    Ongedaan maken
  15. 27 jun.

    Otherwise, in some sense, the audience has to be an RE to understand the explanation. Then, why do they need the RE to begin with? If an RE can tear apart the most complex, obfuscated malware, but can’t make its operation understandable then that RE is just a puzzle solver. (2/3)

    Deze collectie tonen
    Ongedaan maken
  16. 27 jun.

    I’ve come to realize that the most important part of RE is to translate code into language understandable to the audience. Whether C coders, SOC analysts, or newbies, an RE should be able to tailor an explanation accordingly. (1/3)

    Deze collectie tonen
    Ongedaan maken
  17. heeft geretweet
    26 jun.

    Did you know our 1000th penguin chick, Millie, eats one pound of fish every day?! You can help provide for our colony by donating to the Maryland Zoo today, before the fundraising year ends June 30th:

    Ongedaan maken
  18. 26 jun.

    TFW you find seemingly incorrect timezone conversions in and can't figure out whether it's intentional or ignorance.

    Ongedaan maken
  19. heeft geretweet
    25 jun.

    Send your great ICSsec work / session proposal to the CFP ... S4x18 was 447 attendees, 3-days, 3-stages and a lot of fun social

    Ongedaan maken
  20. 26 jun.

    In case PPC isn't your jam, we summarized important findings from our analysis in this Dragos blog post. For example, there are 12 hookable network commands, leaving 11 other options for the attacker.

    Ongedaan maken

Het laden lijkt wat langer te duren.

Twitter is mogelijk overbelast of ondervindt een tijdelijke onderbreking. Probeer het opnieuw of bekijk de Twitter-status voor meer informatie.

    Je bent misschien ook geïnteresseerd in

    ·