Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @orchechik
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @orchechik
-
Prikvačeni tweet
@yaron_samuel and i got credit for CVE-2019-19363 - LPE in many Ricoh Printer Drivers
#exploit#LPE#zerodayhttps://twitter.com/yaron_samuel/status/1220270549508771841 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Excited to speak at
@BlueHatIL about logical vulnerabilities I discovered in Windows Error Reporting
https://twitter.com/BlueHatIL/status/1219306208554889216 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.https://twitter.com/kryptoslogic/status/1218323686761037824 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL"
Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)
https://repnz.github.io/posts/practical-reverse-engineering/dumping-dpc-queues/ …pic.twitter.com/3lguXVoMAF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
After a lot of work and some crypto-related delays, I couldn't be more proud to publish
@aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!): http://windows-internals.com/cet-on-windows/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
I published a write-up for md15 from
@hxpctf 36C3 CTF:https://github.com/oranav/ctf-writeups/tree/master/36c3/md15 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4) https://blog.lexfo.fr/cve-2017-11176-linux-kernel-exploitation-part4.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
@yuvalof and I solved RIDL during#GoogleCTF for@pastenctf. Here's our solution. https://github.com/oranav/ctf-writeups/tree/master/gctf19/RIDL … ... I still don't know exactly why it works though :-)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Our
#36C3 presentation on VMware Virtual Machine Escape (https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10505.html …) is in process. Please watch it in room BORG or on https://streaming.media.ccc.de/36c3/hallb@f1yYY__pic.twitter.com/oacwhYsSay
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Slides + recording of my
#36c3 talk: https://saelo.github.io/presentations/36c3_messenger_hacking.pdf … https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage … had to omit many details, but blogpost coming soon!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
My new blogpost: WoW64 internals - from the kernel initialization, through turbo thunks, "WoW64 functions", xtajit, CHPE, ... all the way to "Heaven's Gate" on ARM. https://wbenny.github.io/2018/11/04/wow64-internals.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
I've been trying to find an updated documentation about user space LFH on Win 10 and I found
@AmarSaar's article on Win10 RS5 (Written in Hebrew but I'm sure it can be translated easily). Very recommended! Great work Saar, well written and fun to read! https://www.digitalwhisper.co.il/files/Zines/0x64/DW100-2-LHF.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
So I translated to myself
@AmarSaar's article on Exploitation and the internals of Windows 10 RS5#LFH (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!https://github.com/peleghd/Windows-10-Exploitation/blob/master/Low_Fragmentation_Heap_(LFH)_Exploitation_-_Windows_10_Userspace_by_Saar_Amar.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Pretty good workshop, describing Windows drivers DSE bypassing! https://github.com/theevilbit/workshops/tree/master/DSE%20Bypass%20Workshop … It allows run LiveCloudKd with own hvmm.sys driver on Windows Server 2019 with Dec 2019 patches and Secure Boot enabled.pic.twitter.com/G70ZAU0j1l
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Here's the final, 4th part in my AppLocker series (for now at least) on DLL blocking. I can see why Microsoft don't consider AL a security boundary ;-) https://tyranidslair.blogspot.com/2019/11/the-internals-of-applocker-part-4.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
3rd entry for kernel exploit tutorial: getting ring0 code execution under SMEP+KPTI+SMAPhttps://github.com/pr0cf5/kernel-exploit-practice/tree/master/bypass-smap …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.https://www.ragestorm.net/blogs/?p=486
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
#APT#Darkhotel#0day#WizardOpium Chrome RCE to windows Privilege Escalation First Chrome 0-day exploit CVE-2019-13720 used in Operation WizardOpium https://securelist.com/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium/94866/ … Then Windows 0-day exploit CVE-2019-1458 used in Operation WizardOpium(Windows 7) https://securelist.com/windows-0-day-exploit-cve-2019-1458-used-in-operation-wizardopium/95432/ …pic.twitter.com/VUwL14hPNf
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
How CVE-2018-8611 can be exploited to achieve privilege escalation on Windows 10 1809 (RS5) and earlier by
@saidelike https://www.offensivecon.org/speakers/2020/cedric-halbronn.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to
@Dark_Puzzle for answering my questions.https://rayanfam.com/topics/reversing-windows-internals-part1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Or Chechik proslijedio/la je Tweet
The slides of our talk "Pool Fengshui in Windows
#RDP Vulnerability Exploitation" at#bluehatseattle are available. https://github.com/ga1ois/BlueHat-2019-Seattle … Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708#bluekeep.pic.twitter.com/4ny08Ba4TL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.