Tweetovi

Blokirali ste korisnika/cu @rceninja

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rceninja

  1. proslijedio/la je Tweet
    5. velj

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  6. proslijedio/la je Tweet
    7. stu 2019.

    It's finally out! Crafting an EFI Emulator and Interactive Debugger -> . Enjoy :-)

    Poništi
  7. proslijedio/la je Tweet
    28. lis 2019.
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. lis 2019.

    Updated awesome-virtualization with references to old and new ideas of a same concept: Virtualization-Based Security BitVisor (SecureVM) - 2008: vbh (Intel) - 2019:

    Poništi
  9. 14. lis 2019.

    :| The structure is well documented in TLFS 5, but I wrote a script to extract it from binary!, just a waste of time👎 But (at least) the result is almost identical to the original structure, and it's good practice of reversing!

    Prikaži ovu nit
    Poništi
  10. 14. lis 2019.
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    11. lis 2019.

    I've started writing a series of articles about reverse engineering the Management Engine, I've just uploaded the first two: , and

    Poništi
  12. proslijedio/la je Tweet
    12. lis 2019.

    Updated Pykd script for showing memory blocks Hyper-V partitions. Now script dynamically get partitions object using winhvr.sys variables.

    Poništi
  13. 9. lis 2019.

    The smallest function I reversed in Hvix64 with the longest name :-), which helped me to understand tens of switch cases🔥 Constants are life savers use them as much as you can!.

    Poništi
  14. proslijedio/la je Tweet
    3. kol 2018.
    Poništi
  15. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. lis 2019.

    After all the hard work that we did... Finally! :-)

    Poništi
  17. 8. lis 2019.

    Checkout the new version of IA32-VMX-Helper Now you can: - Apply proper symbolic constants and comments automatically - Search and explore MSR/VMCS by value or related Instructions in the IDA Gui!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. ruj 2019.

    This has bitten me twice now, so let me reiterate: if you do fuzzing on Windows with Application Verifier (PageHeap etc.), disable logging first: appverif -logtofile disable otherwise your target will start for seconds and then minutes due to linear search of a log file name 😬

    Poništi
  19. 24. ruj 2019.

    Ahh, sorry I forgot the link Here you are

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·