Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @renorobertr
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @renorobertr
-
Prikvačeni tweet
VirtualBox VM escape - CVE-2018-2844 PoC exploit - https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
I repropose my notes about x86, Linux and virtualization in a single text file (~2500 lines only) for my fellow students in Sapienza. https://gist.githubusercontent.com/andreafioraldi/c6ab4765a3821bc6f07537ad4cdafa9e/raw/4351fe1e6235daf85647ad34d2b50df20a21da63/asov_checkshit_singlefile.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Pro-tip. Ever wonder what a structure _actually_ looks like in memory when it's full of unions, typedefs, etc? The `pahole` command (from the `dwarves` package) can take in an ELF with DWARF symbols and output the structures unrolled recursively. Example:https://gist.github.com/gamozolabs/0ec182194706b6e0a3a1ee1a5ae09e17 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Published the write-up of PoE - Path of Exploitation for HITCON CTF! Includes why and how I designed these challenges and how to exploit from the userspace program, the kernel, to QEMU! https://david942j.blogspot.com/2019/10/official-write-up-hitcon-ctf-quals-2019.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
And the slides are available at https://mdsattacks.com/files/hitb19.pdf …
@HITBMedia@HITBPlus#HITBCyberWeekPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
bhyvearm64: cpu and memory virtualization on ARMv8.0-A - https://papers.freebsd.org/2019/bsdcan/elisei-bhyvearm64_cpu_and_memory_virtualization_on_armv8.0_a/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
"Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3. http://www.alunos.dcc.fc.up.pt/~up201407890/Thesis.pdf …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Patch-gapping is also highly relevant to the Linux kernel, where known vulns sit in the syzkaller dashboard or wait months for batches of fixes to be deployed in distro kernelshttps://twitter.com/XI_Research/status/1171086932077682688 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
renorobert proslijedio/la je Tweet
A Linux kernel CTF task that relies on a double-fetch/data-race introduced by the compiler for exploitation:https://rpis.ec/blog/tokyowesterns-2019-gnote/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Short follow-up blog post about the
#FreeBSD research on reference counter overflows. This time: Exploiting mqueuefs and how an#0day was identified during this. Full exploit included ;-) https://secfault-security.com/blog/FreeBSD-SA-1924.mqueuefs.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Writeup for
#QEMU VM Escape found by our team member@vishnudevtj : https://blog.bi0s.in/2019/08/20/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/ … In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!#Exploitationpic.twitter.com/TzvSWZ9W67Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Sushi Roll: A CPU research kernel with minimal noise for cycle-by-cycle micro-architectural introspectionhttps://gamozolabs.github.io/metrology/2019/08/19/sushi_roll.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Some of my notes on exploiting a FreeBSD Kernel vulnerability. Thanks
@Synacktivhttps://twitter.com/Synacktiv/status/1154379831796215808 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Here we go! My first VM Escape in qemu with default configuration. Will publish the exploit and more details when its fixed. Thanks
@renorobertr@Th3_M3nt0r and@teambi0s for the inspiration and support !pic.twitter.com/v6ptSgNM6zHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
I wrote about CVE-2018-6924, a FreeBSD kernel memory disclosure vulnerability affecting the code that parses the ELF header of a binary prior to its execution: https://blog.quarkslab.com/cve-2018-6924-freebsd-elf-header-parsing-kernel-memory-disclosure.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
Longer form thoughts on bug bounties, NDAs and why you shouldn't complain about people turning them down: https://mjg59.dreamwidth.org/52432.html
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
During
#DEFCON Quals we discovered CPU-level errata... and then we exploited it: http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ …#Intel#TSX#shellcodingpic.twitter.com/HNYCB1hR2S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
AMD-SEV: Platform DH key recovery via invalid curve attack (CVE-2019-9836) https://seclists.org/fulldisclosure/2019/Jun/46 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je Tweet
VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience
https://github.com/Kira-cxy/qemu-vm-escape …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
renorobert proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.