Tweetovi

Blokirali ste korisnika/cu @orchechik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @orchechik

  1. Prikvačeni tweet
    23. sij

    and i got credit for CVE-2019-19363 - LPE in many Ricoh Printer Drivers 😎

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    Excited to speak at about logical vulnerabilities I discovered in Windows Error Reporting 😀

    Poništi
  3. proslijedio/la je Tweet

    My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  6. proslijedio/la je Tweet
    11. sij

    I published a write-up for md15 from 36C3 CTF:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. pro 2019.

    CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)

    Poništi
  8. proslijedio/la je Tweet
    3. stu 2019.

    and I solved RIDL during for . Here's our solution. ... I still don't know exactly why it works though :-)

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    Our presentation on VMware Virtual Machine Escape () is in process. Please watch it in room BORG or on

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    4. stu 2018.

    My new blogpost: WoW64 internals - from the kernel initialization, through turbo thunks, "WoW64 functions", xtajit, CHPE, ... all the way to "Heaven's Gate" on ARM.

    Poništi
  12. proslijedio/la je Tweet
    13. pro 2019.

    I've been trying to find an updated documentation about user space LFH on Win 10 and I found 's article on Win10 RS5 (Written in Hebrew but I'm sure it can be translated easily). Very recommended! Great work Saar, well written and fun to read!

    Poništi
  13. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  14. proslijedio/la je Tweet
    14. pro 2019.

    Pretty good workshop, describing Windows drivers DSE bypassing! It allows run LiveCloudKd with own hvmm.sys driver on Windows Server 2019 with Dec 2019 patches and Secure Boot enabled.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. stu 2019.

    Here's the final, 4th part in my AppLocker series (for now at least) on DLL blocking. I can see why Microsoft don't consider AL a security boundary ;-)

    Poništi
  16. proslijedio/la je Tweet
    12. stu 2019.

    3rd entry for kernel exploit tutorial: getting ring0 code execution under SMEP+KPTI+SMAP

    Poništi
  17. proslijedio/la je Tweet
    12. pro 2019.

    Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.

    Poništi
  18. proslijedio/la je Tweet
    10. pro 2019.

    Chrome RCE to windows Privilege Escalation First Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium Then Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium(Windows 7)

    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 (RS5) and earlier by

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  21. proslijedio/la je Tweet
    2. pro 2019.

    The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·