Electric Wizard

@memcorrupt

Breaks stuff and lays on the sofa.

(⌐■_■)
Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @memcorrupt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @memcorrupt

  1. Prikvačeni tweet
    13. tra 2016.

    Internet of Twerps

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    After two years of not using Facebook - I logged in today to check out this new tool that shows what Facebook has been tracking. Despite this, they have seen my every move on the Internet - this is creepier than I had imagined.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  4. proslijedio/la je Tweet

    LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.

    Poništi
  5. proslijedio/la je Tweet
    27. sij
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    A massive cyber espionage campaign, which we found so spooked US intelligence that it changed how the government handles DNS registration, was the work of hackers aligned with the Turkish government

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    One day was bored, so he looked around his room - a few days later, he had reversed how his Playstation streamed audio to it's dualshock controller An epic walkthrough from idea to success.

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    AMD ATI Radeon ATIDXX64.DLL shader functionality VTABLE remote code execution vulnerability - and quote "This vulnerability can be triggered from VMware guest, affecting VMware host." gg

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    25. sij

    Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy!

    Poništi
  13. proslijedio/la je Tweet
    26. sij

    Who would have thought such an scenario would be possible, eh? "Chinese hackers have used a zero-day in the Trend Micro OfficeScan antivirus during their attacks on Mitsubishi Electric"

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Spotify DRM Bypass + PoC

    Poništi
  15. proslijedio/la je Tweet
    21. sij

    Today published research that me and my colleges have been hard at work on. For 6 months we ran a factory.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. sij

    Nice collection of chrome sandbox escape POCs/exploits and methodology, go check it out !

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    17. sij

    Recently at the 36th CCC, Moxie Marlinspike gave a talk claiming decentralized systems are unable to adapt and succeed and that centralized systems can meet the same goals better. Here’s why he’s wrong; decentralized systems are simply better.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    I've always liked this quote and it sums up my views on infosec and more broadly in academia, quite nicely. "In theory, there is no difference between theory and practice. But in practice, there is".

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  21. proslijedio/la je Tweet
    23. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·