Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out!
Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this
https://niemand.com.ar/2020/01/31/reversing-xigncode3-driver-part-4-1-registering-notify-and-callback-routines/ …
#reversing#hacking#infosec#securitypic.twitter.com/5tmM5JOyBe
-
Reversing XignCode3 Anticheat - Part 3 is now out!
Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.
https://niemand.com.ar/2020/01/24/reversing-xigncode3-driver-part-3-analyzing-dispatch-functions/ …
#reversing#hacking#security#infosecpic.twitter.com/LUDWutF7pI
-
Reversing XignCode3 Driver – Part 2 – Analyzing init functions Part 2 is online! Understand how the Anticheat Driver inits some custom structures and variables that are later used to dispatch the different IOCTLs. https://niemand.com.ar/2020/01/16/reversing-xigncode3-driver-part-2-analyzing-init-functions/ …
#reversing#security#hacking#infosecpic.twitter.com/3uwXNWlN09
-
Reversing XignCode3 Driver – Part 1 – Identifying the Driver Entry Point A mini-series of blog posts about XingCode 3. It should be a good way to jump into Windows Driver reversing if you haven't done it before :) https://niemand.com.ar/2020/01/08/reversing-xigncode3-driver-part-1-identifying-the-driver-entry-point/ …
#reversing#security#hackingpic.twitter.com/wucdojsrHd
-
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of
@BlackHatEvents !! https://www.youtube.com/watch?v=yJHyHU5UjTg …#BHEU#security#infosecPrikaži ovu nit -
I like this photo. Maybe this would be a enough to get an account with my new email, which is not linked to my Facebook account? Is this an automatic process or there is actually people involved solving these issues?pic.twitter.com/q21IZG6Eg6
Prikaži ovu nit -
Parece que a
@facebook e@instagram no le gusta que te crees una cuenta con un mail que no está en ninguna de sus redes sociales. Automáticamente piden foto para confirmar identidad. Hermoso.pic.twitter.com/W0Y8oxZwxh
-
Video of players using a new Fallout 76 exploit to steal player's item and spawn any item in game. https://youtu.be/Xehnhq38EHk It took 4 days to fix it to Bethesda. Here you have the original post on UC released the 10th of Dec. Patched the 18th. https://www.unknowncheats.me/forum/other-fps-games/366670-fallout-76-item-plan-object-spawner-legendary-item-creation.html …pic.twitter.com/9Jdp8IUJ2Q
-
There is also here a neat workshop that
@0xAlexei and@0xJeremy gave at Infiltrate :)https://vimeo.com/335158460Prikaži ovu nit -
Ouch! I'm not a filmmaker, but parsing user input in the Backend with a C application sound like an horror movie. https://twitter.com/samwcyo/status/1208461516674084867 …pic.twitter.com/EYFsXSZf5a
-
My
@BlackHatEvents slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the@Immunityinc site. You can find additional information about bypasses to multiple Anticheats (new info at the end) https://immunityinc.com/resources/papers-presentations.html …#reversing#security#BHEU#Blackhatpic.twitter.com/PgsluKijFE
-
-
Breaking Bootloaders on the Cheap at
#BHEU by@qaistemeiza and@sublevadopic.twitter.com/tHxcCDO6lL
Prikaži ovu nit -
-
-
A good graph that explains the continuity protocol stack
#BHEUpic.twitter.com/9Pe6P1WRhQ
Prikaži ovu nit -
-
-
Trust in Apple's Secret Garden: Exploring & Reversing Apple's Continuity Protocol
#BHEU with@evanslifypic.twitter.com/5Ie3THubSd
Prikaži ovu nit -
#BHEU BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authenticationpic.twitter.com/aKnKuf6K2C
Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.