Peleg Hadar

@peleghd

Security Researcher at . I have a passion for various InfoSec topics such as Offensive Security, Windows Internals, RE, Low-Level and Vuln Research

Vrijeme pridruživanja: lipanj 2015.

Tweetovi

Blokirali ste korisnika/cu @peleghd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @peleghd

  1. 1. velj

    If you want to start a research on one of Apple's mechanisms which are related to the Continuity protocol - this repo looks like a great reference to start with.

    Poništi
  2. proslijedio/la je Tweet
    29. sij
    Poništi
  3. 21. sij

    A great novel research by Amit Klein - Labs:

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    The wait is finally over! Registration & schedule for 2020 are live. Places are limited so register NOW:

    Poništi
  5. proslijedio/la je Tweet
    17. sij

    SafeBreach Labs is the 1st BAS solutions to deliver simulations for endpoint and network coverage.

    Poništi
  6. proslijedio/la je Tweet

    last use case for today Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    17. sij

    1/ Insights from analyzing Chrome's patch for to protect Chrome's users on vulnerable unpatched machines

    Prikaži ovu nit
    Poništi
  8. 17. sij

    "The ECC discrete log parameter P-256... [SNIP] ... is suspected of having an NSA backdoor in its unexplained constants" -2020-0601

    Poništi
  9. 16. sij

    If you own a Windows 10 box - don’t wait, update it now.

    Poništi
  10. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  11. proslijedio/la je Tweet

    The United States says plans to launch multiple cyber attacks in retaliation for the killing of Qasem . Israeli company, , tells i24NEWS' Ariel Levin-Waldman how one can identity, and combat Iranian 'threat groups' :

    Poništi
  12. proslijedio/la je Tweet
    14. sij

    OK, this explains the call to ChainComparePublicKeyParametersAndBytes() in ChainGetSubjectStatus():

    Poništi
  13. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  14. proslijedio/la je Tweet
    3. sij

    The Fuzzing Round Table Video from hosted by and me and featuring and many more. Sorry for the sound, it could be a lot better but is understandable at least.

    Poništi
  15. proslijedio/la je Tweet
    31. pro 2019.

    Check out my writing on HyperV internals (Hebrew). Special thanks to for advising on the topic.

    Poništi
  16. proslijedio/la je Tweet

    How to prepare a dll to be loaded into LSASS with protection mode? -Get an EV Code signing cert (300$) -Open a MS partner account -add the "hardware" program -go to "file signing service" - prepare a cab containing the dll - sign the cab with your cert - submit and wait 1 hour

    Poništi
  17. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    28. pro 2019.

    With , the (unofficial) Hyper-V Development Kit now includes the most complete and accurate public list of all Hyper-V Call Codes (way ahead of the TLFS which has not been updated in years). I hope this is useful to others -- cc

    Poništi
  19. 28. pro 2019.

    Just watched a great symbolic execution talk (find multi binary vulnerabilities in embedded firmware at scale) by Great talk! Very recommend to watch

    Poništi
  20. proslijedio/la je Tweet
    26. pro 2019.

    Great stuff to recover symbols for all those embedded Linux kernels I wrote a script for this long ago but it became outdated and required unpacking the kernel first. This one looks much nicer and up-to-date (check the history write-up in the comments!)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·