toshi

@piazzt

Security Engineer for MSFT; Member of | Icon:

Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @piazzt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @piazzt

  1. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    9. sij

    My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!

    Poništi
  3. proslijedio/la je Tweet
    28. stu 2019.

    We’re adding two engineers to our team. One focused on security tools in Rust, the other on mitigations. Apply directly, or DM me.

    Poništi
  4. proslijedio/la je Tweet
    8. lis 2019.

    Cybersecurity expert Bulent Yener is ringing the bell to close the NYSE for the day, following up a day of Cybersecurity . What an honor!

    Poništi
  5. proslijedio/la je Tweet
    23. ruj 2019.

    I uploaded my BadType challenge from last weekend's Dragon CTF Teaser on GitHub. It's a medium-difficulty RE task for Windows x64 (worth 400 pts), solved by 9⃣ teams during the competition.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    16. ruj 2019.

    Hype train is officially leaving the station! Windows is about to get a whole lot cleaner. I'm so happy that and I were in the right-place at the right-time to get to work on this with Jim and Shayne.

    Poništi
  7. proslijedio/la je Tweet
    15. ruj 2019.

    Congratulations to the top 12 teams for being qualified. Please send your writeups to info@realworldctf.com within 48 hours, i.e. before Sep. 18th 2019 10:00 UTC +8. We will confirm your qualification and reply with detailed information about the finals.

    Poništi
  8. proslijedio/la je Tweet
    13. kol 2019.

    August Patch Tuesday includes fixes for our internal finds in RDP, including RCE and remote info disclosure, and affecting Win 10 latest. The team successfully built a full exploit chain using some of these, so it's likely someone else will as well. Patch and enable NLA.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    23. srp 2019.

    I'm searching for an engineering leader to help shape how Microsoft mitigates security issues and eliminates vulnerabilities. You'll lead a small but growing team, work with groups across the company, and solve tough engineering problems. (1/2)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    What if you could eliminate a common class of vulnerabilities by changing the language you used? MSRC is publishing a series on why Microsoft is looking at for memory-safe development and why we think you should too. See the first post here:

    Poništi
  11. proslijedio/la je Tweet
    6. lip 2019.

    Giving my first conference talk ever at this year, so excited! What happens when you focus all your effort into making fuzzing faster? Can a bad fuzzer produce good results when running 1 trillion fuzz cases a week? Intro to the concept:

    Poništi
  12. proslijedio/la je Tweet
    4. tra 2019.

    fans – has released the source code! Visit to download and customize your experience. Don’t miss the 9.0.2 patch also available for download.

    Poništi
  13. proslijedio/la je Tweet
    14. velj 2019.

    We've built tools for fuzzing based on emulation of a process snapshot captured via minidump. We're considering open sourcing the tool, and I'm curious about interest level from the rest of the world. (1/3)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    12. velj 2019.

    Windows DHCP Server RCE found by the team I'm on, got patched today! Such a great group of people to work with 😊 Smash that update button!

    Poništi
  15. proslijedio/la je Tweet
    7. velj 2019.

    Pretty stoked to find out that Libfuzzer now runs on Windows :)

    Poništi
  16. proslijedio/la je Tweet
    31. sij 2019.

    Growing Hypervisor 0day with Hyperseed by Shawn Denbow, Microsoft

    Poništi
  17. proslijedio/la je Tweet
    24. kol 2018.

    This is the UI for Raptor. Raptor is a higher-level IR over Falcon IL. It does things like lift stack variables, resolve function arguments (when it can), and make programs more amenable to analysis. This project has taught me Binary Ninja is very, very fast :p :).

    Poništi
  18. proslijedio/la je Tweet
    13. kol 2018.

    Excited we got 10th at . Thanks to for hosting. Congrats to all the other teams, it was a hard fought battle. See you all next year!

    Poništi
  19. proslijedio/la je Tweet
    12. kol 2018.

    Order has been established! Thank you, cybercitizens, and congratulations to DEFKOR00T for winning ! Enjoy the black badges. Congrats to 2nd place PPP and 3rd place HITCON!

    Poništi
  20. 30. lip 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·