Tweetovi

Blokirali ste korisnika/cu @molgryn

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @molgryn

  1. proslijedio/la je Tweet
    4. velj

    님으로부터 상받았다 ㅋㅋㅋㅋㅋㅋ

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    I hope my last 3 write-ups have covered the subject of filesystem bugs enough. It talks about discovery using procmon, and also poc writing now. You can just copy paste from the poc on github for a lot of bugs I guess. I hope it helps get atleast one person into the field.

    Poništi
  3. proslijedio/la je Tweet
    31. sij
    Poništi
  4. proslijedio/la je Tweet
    31. sij
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    CVE-2019-1406 : Microsoft Jet Engine ColumnLvText Type Confusion CVE-2019-1250 : Microsoft Jet database Record::IsNull Memory Corruption Found by &

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    Google says it paid bug hunters $6.5 million in 2019 - paid 461 researchers in total - highest award was $201,000

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    After examining and rereading , MS solution to most Elevation of Privilege (Symbolic\Hard Link) attacks is: Either keeping an open handle to the exploited resource or doing local impersonation correctly. Like in Or in

    Poništi
  12. proslijedio/la je Tweet
    24. sij

    So here is my next blog post as promised. This time about my approach to corpus distillation. Also, I released new tools and fixes for Rehepapp toolset.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    23. sij

    2nd critical of this week. Abuse ouath Sign-up flow: 1) Use phone number instead email in 3rd party to sign-up. 2) Link victim's email to your 3rd party account while singnup on target. 3) Login to vicitim's account using your 3rd party account.

    Poništi
  14. proslijedio/la je Tweet
    19. sij

    Github Find: People uploading their chrome session data as part of their dotfiles...

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  16. proslijedio/la je Tweet
    18. sij

    presents dynamic binary instrumentation techniques that can help reverse engineers deal with obfuscated codes. Learn how these techniques aim to be obfuscator resilient so it doesn’t rely on a special kind of obfuscation in this Briefing

    Poništi
  17. proslijedio/la je Tweet
    16. sij

    We have a working proof-of-concept exploit for ‘Whose Curve is it Anyway?’ — NSA’s bug in Microsoft’s Crypto API. Read on for our explainer:

    Poništi
  18. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. sij

    [Blog] Avira VPN Local Privilege Escalation Uses some fun tricks to circumvent service DACL and integrity checks.

    Poništi
  20. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·