Tweetovi

Blokirali ste korisnika/cu @qqqq54358987

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @qqqq54358987

  1. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  2. proslijedio/la je Tweet
    10. ruj 2019.
    Poništi
  3. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  4. 7. ruj 2019.
    Poništi
  5. proslijedio/la je Tweet
    3. ruj 2019.

    I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    14. srp 2019.

    We arrange and fake JavaScript objects to create some crazy memory layout ✨🤩✨ This preparation is the necessary foundation to achieve arbitrary read/write in the next episode.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. svi 2019.

    I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. svi 2019.

    Original source disappeared so I forked these on GitHub and will add them to my refs section on after I ping authors, etc

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    23. svi 2019.

    Nice archive of papers related to fuzzing

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    6. tra 2019.

    CoreTrust & AMFI are cool. jk jk, bypass:

    Poništi
  11. proslijedio/la je Tweet
    25. ožu 2019.

    Motivated by a question from a friend and his coworker, I wrote a blog about HyperV and exit dispatching. See cc Also, and I are offering a course on hypervisor development! See

    Poništi
  12. proslijedio/la je Tweet
    11. ožu 2019.

    The new Intel PT decoder in WinAFL is ~10x faster than the reference implementation. This means that the trace decoding is no longer the bottleneck for fuzzing and leads to a nice performance bump in this mode (although note there is still some overhead from tracing itself).

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    La Casa de PaPeL: A detailed write up and tutorial on reverse engineering Apple's Page Protection Layer () in and chips, with just and any Kernelcache.release.iphone11 of your choice:

    Poništi
  14. proslijedio/la je Tweet
    26. velj 2019.

    Thunderclap TL;DR: someone finally tried on PCs (over Thunderbolt) what we did on the PS4 (over PCIe) years ago. As I said at the time, IOMMUs are useless if the drivers are not written assuming the device is evil. *Nobody* writes PCIe drivers assuming the device is evil.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. velj 2019.

    Here are the slides from my talk about my approach for JavaScript engine fuzzing: My master's thesis (for which I developed the fuzzer) can be found here: Thanks for the great conference ! =)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. velj 2019.

    Project Zero blog: "Examining Pointer Authentication on the iPhone XS" by Brandon Azad () -

    Poništi
  17. proslijedio/la je Tweet
    1. velj 2019.

    My analysis of Apple's implementation of PAC on the A12 (a substantial improvement over the ARM standard for protecting against kernel attackers):

    Poništi
  18. proslijedio/la je Tweet
    28. sij 2019.

    Yet another great article that briefly explains about some of the security features introduced in Intel processors like WP, NXE/XD, MPX, SGX, Protection keys. I didn't aware of most of them.

    Poništi
  19. proslijedio/la je Tweet
    27. sij 2019.

    Interested in Hyper-V Internals? Read Part 2 of my continuing series on "Writing a Hyper-V "Bridge" for Fuzzing" as we get into the guts of hypercalls: with sample code and more!

    Poništi
  20. 27. sij 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·