Tweetovi

Blokirali ste korisnika/cu @nickeverdox

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nickeverdox

  1. 9. ruj 2019.

    And then it happened. 40 days later with zero acknowledgement, and even a response from MSRC saying "we aren't interested in this." It was patched.

    Poništi
  2. proslijedio/la je Tweet
    8. kol 2019.

    The gangs all here for DEFCON. If anyone wants to meet up, lemme know.

    Prikaži ovu nit
    Poništi
  3. 19. srp 2019.

    InfinityHook sample is live, please consult the readme. Massive kudos to for incredible code clean-up. Microsoft says this is not security issue, have fun.

    Poništi
  4. 17. srp 2019.

    What if for the last decade you could actually hook system calls, context switches, page faults and other meme shit all while working alongside patchguard and underneath vbs/hyperguard? coming soon @

    Poništi
  5. 14. lip 2018.

    I don't always use DCI based jtag, but when I do, it's relatively useless and single stepping one instruction takes 3 seconds.

    Poništi
  6. 9. svi 2018.

    Shout out to Andy Lutomirski(Linux) & Andrew Cooper(Xen) for doing additional testing and enlightening us to the fact that Intel is also vulnerable to a spurious after SYSCALL, not just AMD. We've updated the paper to reflect this.

    Poništi
  7. 8. svi 2018.
    Poništi
  8. 13. tra 2018.

    Patchguard in RS4 has some love waiting for garbage hypervisors that spoof LSTAR ;)

    Poništi
  9. 4. sij 2018.

    It may have been considered, but trapping on RDTSC and masking the low 9 bits could make for an interesting mitigation, as opposed to a PT swap on every user <-> kernel transition. Surely someone has thought of this, I want input.

    Poništi
  10. 26. lip 2015.

    SYSTEMINFOCLASS, PROCESSINFOCLASS, and THREADINFOCLASS definition additions for Windows 10 -

    Poništi
  11. 3. svi 2015.
    Poništi
  12. 11. stu 2013.

    easy debugger detection with GetProcessIoCounters

    Poništi
  13. 20. lis 2013.

    Tricky and powerful anti-trace/debug using LBR and BTF

    Poništi
  14. 15. lis 2013.
    Poništi
  15. 23. srp 2013.

    kernel/user shared page kernel debugger detection. not what you think ;p

    Poništi
  16. 2. srp 2013.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·