Himanshu Khokhar Jaat

@pwnrip

Hacking | Philosophy

127.0.0.1
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @pwnrip

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pwnrip

  1. Prikvačeni tweet
    14. kol 2019.

    Videos of leHACK have been released and I am happy to share this with you all. My talk on Windows Kernel Exploitation starts at 01:38:38 - Cc:

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Here's a cool trick to break out of AppLocker in Citrix environment: 1. Open a dummy RTF file in wordpad 2. Add ftp.exe as an object 3. Click to open ftp (or other similar apps) 4. ftp>!{commmand/app to run} for example: ftp>!cmd <-- blocked? ftp>!powershell <-- not blocked?:)

    Poništi
  5. 24. sij

    Little tidbits can help in the long run.

    Poništi
  6. 23. sij
    Poništi
  7. proslijedio/la je Tweet

    Keep ur days solid 8s. Every day ain't a 10. (me today) 10 am - 6 eggs, oatmeal, emails 1 pm - front squats, RDLs, lunges 2:30 pm - chicken, rice, broc. 6 pm - closed deal w/ prolific CTO 7 pm - protein waffles 8 pm - city league. gave em 25, W 10 pm - eat, plan tomorrw

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas 😃

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    21. sij

    In those CET times: It's possible to return in unwinding to any address in the SSP, causing a "type confusion" between stack frames ;) I really like the different variants of this concept :) Type confusions are on fire! (stack frames, objc for PAC bypass)

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Political correctness is feminine. It's indirect communication. It's the avoidance of saying exactly what you mean, so as to avoid offending soft, weak minds. It's how women communicate with each other. Masculine men don't have time for that crap. They're chasing results.

    Poništi
  11. proslijedio/la je Tweet
    20. sij

    Friends, I am pleased to announce I have finished our zines collection! We've added: -doomriderz -inception -Immortal Riot -matrix -rRlf -VLAD All really cool stuff. All have absolutely incredible work. Check them out here: 1luv -smelly__vx

    Poništi
  12. proslijedio/la je Tweet
    18. sij

    I'm putting together a list of resources for learning about PE file format and Windows Loader, can you recommend me the best resources to add to this guide?

    Poništi
  13. proslijedio/la je Tweet

    Isn't it an incredible coincidence that the *SAME GIRL* is interviewed *by 4 different reporters* *on 4 different days* *in 4 different places* on the same subject by NDTV????😜

    Poništi
  14. proslijedio/la je Tweet
    17. sij

    [local] Torrent FLV Converter 1.51 Build 117 - Stack Oveflow (SEH partial overwrite)

    Poništi
  15. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  16. proslijedio/la je Tweet
    15. sij

    Hey! I’m talking to you. I know you want to build an agency. And someone convinced you that paying them $497 is the only way forward Here’s an alternate route: ➊ Cashvertising ➋ 1-Page Marketing Plan ➌ The Creativity Checklist RT to save someone’s wallet…

    Poništi
  17. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  18. 13. sij
    Poništi
  19. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  20. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  21. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·