Frank Boldewin

@r3c0nst

Reverser, Malware Researcher, Threat Intelligence dude, focused on hunting APTs targeting the financial industry.

Germany
Vrijeme pridruživanja: siječanj 2015.

Tweetovi

Blokirali ste korisnika/cu @r3c0nst

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r3c0nst

  1. Prikvačeni tweet
    12. pro 2018.
    Poništi
  2. 9. sij

    One of those Alice samples. Haven't seen this panel before, though old build date, uploaded on 09th January 2020 from DE. Maybe something for your malware zoo. Supervisor ID is '123' -rule:

    Poništi
  3. 28. pro 2019.

    IDA Pro 7.x plugin that integrates decompiler code by Chris Eagle ( ) Awesome!

    Poništi
  4. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    21. pro 2019.

    A post I wrote in 2017 on bypassing CarbonBlack all products, since the trick is still unfixed, decided to public it..

    Poništi
  6. proslijedio/la je Tweet
    30. stu 2019.

    Windows Privilege Escalation approach: This blog is so articulate and well written for any beginner to learn Windows Privesc. Thanks

    Poništi
  7. 29. stu 2019.

    Just released my Group-IB CyberCrimeCon Singapore slides. It's a case i have investigated in March 2019. These slides contain all the details i found out during my investigation. Enjoy!

    Poništi
  8. proslijedio/la je Tweet
    26. stu 2019.

    Relocating BaseAddress Agnostic Memory Dumps ~ Modifying pe_unmapper to allow remapping without LoadBase.

    Poništi
  9. 22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  10. 18. stu 2019.

    So Phineas Fisher wrote a detailed guide howto hack a bank and transfer money via SWIFT. It seems he failed transferring large amounts because of missing knowledge in the interbanking environment. A circumstance that could change quickly.

    Poništi
  11. 14. stu 2019.

    Windows privilege escalation exploit for CVE-2019-1322 + CVE-2019-1405 With Sourcecode, binary and howto Video. Tested and works! Expect this to be used in future malware.

    Poništi
  12. 13. stu 2019.

    New tool for your arsensal. sniffs credentials out of RDP sessions by injecting into the mstsc.exe process.

    Poništi
  13. 8. stu 2019.

    Surely one of the craziest financial hacker stories in 2019. I will talk about the details in Singapore @ GROUP-IB‘s

    Poništi
  14. 20. lis 2019.

    Legacy repo of my discontinued reconstructer website with some tools and papers from 2006 - 2013 now moved to Github.

    Poništi
  15. 18. lis 2019.
    Poništi
  16. 14. lis 2019.

    IDA Pro 7.4 has been released. Now with Python 3 support, new processor modules, structure editor, decompiler improvements and much more.

    Poništi
  17. 4. ruj 2019.

    Five Chinese nationals involved in the country's biggest cyber heist in the banking sector so far. Never heard of chinese cybercriminals in that business before. ^^

    Poništi
  18. 30. kol 2019.

    Rico, a Junior Analyst in our SoC-Team did a great writeup how to fully deobfuscate a heavily obfuscated JSE downloader used by Deobfuscator ->

    Poništi
  19. 28. kol 2019.

    Fresh XFSCashNCR directly from Chile. Build date 30th July 2019. Uploaded to VT on 28th August 2019. Hash --> d6dff67a6b4423b5721908bdcc668951f33b3c214e318051c96e8c158e8931c0 rule -->

    Poništi
  20. proslijedio/la je Tweet
    24. kol 2019.

    The first version of my new plugin (Windbg2IDA) is released. Using this plugin, you’ll be able to dump each step in Windbg then see the code coverage results in IDA, you can also compare two or more dumps w/ different colors & lots of other cool features.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    15. kol 2019.

    After much delay.. the Windows Sysmon Logging Cheat Sheet has been released !!!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·