Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @peleghd
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @peleghd
-
If you want to start a research on one of Apple's mechanisms which are related to the Continuity protocol - this repo looks like a great reference to start with.https://twitter.com/trufae/status/1223618542446219267 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
A great novel research by Amit Klein -
@safebreach Labs:https://safebreach.com/Post/EFS-Ransomware …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
The wait is finally over! Registration & schedule for
#BlueHatIL 2020 are live. Places are limited so register NOW: http://bluehatil.com pic.twitter.com/JXXx8OQOYn
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
SafeBreach Labs is the 1st BAS solutions to deliver simulations for endpoint and network coverage.
#cybersecurity#infosechttp://ow.ly/9CVA50xYDzXHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
#cve20200601#curveball last use case for today Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you)pic.twitter.com/bHGQ8ZEMs7Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
1/ Insights from analyzing Chrome's patch for
#curveball#cve20200601 to protect Chrome's users on vulnerable unpatched#Win10 machines https://chromium-review.googlesource.com/c/chromium/src/+/1994434/6/net/cert/cert_verify_proc_win.cc …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
"The ECC discrete log parameter P-256... [SNIP] ... is suspected of having an NSA backdoor in its unexplained constants"
#CVE-2020-0601#Curveballhttps://twitter.com/spovolny/status/1217946727732277248 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you own a Windows 10 box - don’t wait, update it now.https://twitter.com/ollypwn/status/1217838778003398656 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
After a lot of work and some crypto-related delays, I couldn't be more proud to publish
@aionescu's and mine latest research - The complete overview of CET internals on Windows (so far!): http://windows-internals.com/cet-on-windows/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
The United States says
#Iran plans to launch multiple cyber attacks in retaliation for the killing of Qasem#Soleimani. Israeli#cybersecurity company,@safebreach, tells i24NEWS' Ariel Levin-Waldman how one can identity, and combat Iranian 'threat groups' :pic.twitter.com/oOthBIPGSXHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
OK, this explains the call to ChainComparePublicKeyParametersAndBytes() in ChainGetSubjectStatus():pic.twitter.com/73kigQtgw9
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
The Fuzzing Round Table Video from
#36c3 hosted by@andreafioraldi and me and featuring@is_eqv and many more. Sorry for the sound, it could be a lot better but is understandable at least.https://youtu.be/Nw3v21Zz2g8Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
Check out my writing on HyperV internals (Hebrew). Special thanks to
@AmarSaar for advising on the topic. https://www.digitalwhisper.co.il/files/Zines/0x72/DW114-4-HyperV-Security.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
How to prepare a dll to be loaded into LSASS with protection mode? -Get an EV Code signing cert (300$) -Open a MS partner account -add the "hardware" program -go to "file signing service" - prepare a cab containing the dll - sign the cab with your cert - submit and wait 1 hourpic.twitter.com/kVnGROF4Bv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer https://andreafioraldi.github.io/articles/2019/12/20/sanitized-emulation-with-qasan.html … I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
With https://github.com/ionescu007/hdk/commit/0a952eb8fcb33353e90e47569201105904ab2df1 …, the (unofficial) Hyper-V Development Kit now includes the most complete and accurate public list of all Hyper-V Call Codes (way ahead of the TLFS which has not been updated in years). I hope this is useful to others -- cc
@gerhart_x@AmarSaarHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just watched a great symbolic execution talk (find multi binary vulnerabilities in embedded firmware at scale) by
@badnack#36c3 Great talk! Very recommend to watchpic.twitter.com/Z09ydNUOvd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Peleg Hadar proslijedio/la je Tweet
Great stuff to recover symbols for all those embedded Linux kernels https://redd.it/efxd0x I wrote a script for this long ago but it became outdated and required unpacking the kernel first. This one looks much nicer and up-to-date (check the history write-up in the comments!)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.