Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @qqqq54358987
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @qqqq54358987
-
qqqq proslijedio/la je Tweet
The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr
@PetrBenes as Hypervisor From Scratch could never have existed without his help and to Alex@aionescu for patiently answering my questions.https://rayanfam.com/topics/hypervisor-from-scratch-part-7/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Hyper-V memory internals. Guest OS memory access (English version) https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html …pic.twitter.com/ylE5jYB7kC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog: https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
qqqq proslijedio/la je Tweet
I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think. https://azeria-labs.com/heap-exploit-development-part-1/ …pic.twitter.com/cW7PltzbA9
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
We arrange and fake JavaScript objects to create some crazy memory layout


This preparation is the necessary foundation to achieve arbitrary read/write in the next episode.
https://www.youtube.com/watch?v=3c6nC0wdU-Q …pic.twitter.com/SCk3BHg7KIPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own https://phoenhex.re/2019-05-26/attribution-is-hard-at-least-for-dock …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Original source disappeared so I forked these on GitHub and will add them to my refs section on http://fuzzing.io after I ping authors, etchttps://github.com/richinseattle/FuzzingPaper …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Nice archive of papers related to fuzzinghttps://github.com/wcventure/FuzzingPaper …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
CoreTrust & AMFI are cool. jk jk, bypass:https://github.com/jakeajames/jelbrekLib …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Motivated by a question from a friend and his coworker, I wrote a blog about HyperV and exit dispatching. See https://gracefulbits.com/2019/03/25/some-notes-on-identifying-exit-and-hypercall-handlers-in-hyperv/ … cc
@AmarSaar@gerhart_x@d_olex Also,@standa_t and I are offering a course on hypervisor development! Seehttps://gracefulbits.regfox.com/designing-and-implementing-a-hypervisor-for-security-analysis …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
The new Intel PT decoder in WinAFL is ~10x faster than the reference implementation. This means that the trace decoding is no longer the bottleneck for fuzzing and leads to a nice performance bump in this mode (although note there is still some overhead from tracing itself).pic.twitter.com/nT91RydCuj
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
La Casa de PaPeL: A detailed write up and tutorial on reverse engineering Apple's Page Protection Layer (
#PPL) in#iOS12 and#A12 chips, with just#jtool2 and any Kernelcache.release.iphone11 of your choice: http://newosxbook.com/articles/CasaDePPL.html …pic.twitter.com/PRQPhX88Zo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Thunderclap TL;DR: someone finally tried on PCs (over Thunderbolt) what we did on the PS4 (over PCIe) years ago. As I said at the time, IOMMUs are useless if the drivers are not written assuming the device is evil. *Nobody* writes PCIe drivers assuming the device is evil.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Here are the slides from my
#OffensiveCon19 talk about my approach for JavaScript engine fuzzing: https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf … My master's thesis (for which I developed the fuzzer) can be found here: https://saelo.github.io/papers/thesis.pdf … Thanks for the great conference@offensive_con! =)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Project Zero blog: "Examining Pointer Authentication on the iPhone XS" by Brandon Azad (
@_bazad) - https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
My analysis of Apple's implementation of PAC on the A12 (a substantial improvement over the ARM standard for protecting against kernel attackers): https://googleprojectzero.blogspot.com/2019/02/examining-pointer-authentication-on.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Yet another great article that briefly explains about some of the security features introduced in Intel processors like WP, NXE/XD, MPX, SGX, Protection keys. I didn't aware of most of them.https://github.com/huku-/research/wiki/Intel-CPU-security-features …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
qqqq proslijedio/la je Tweet
Interested in Hyper-V Internals? Read Part 2 of my continuing series on "Writing a Hyper-V "Bridge" for Fuzzing" as we get into the guts of hypercalls: http://www.alex-ionescu.com/?p=471 with sample code and more!pic.twitter.com/HB0X9dvSw7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.