Richard Johnson

@richinseattle

Training & Publications @ ; Director of Security Research, Oracle Cloud; previous Security Researcher @ Cisco Talos, Sourcefire, MSRC, iDEFENSE

uninformed.org // undercurrents.io https://github.com/richinseattle https://github.com/moflow https://github.com/fuzzing-io
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @richinseattle

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @richinseattle

  1. Prikvačeni tweet
    17. stu 2019.

    “Many attempted and failed, but you succeeded.. how?” “I read the book and followed the instructions” - Sam “RTFM” Turley

    Poništi
  2. I'm just as lost when trying to figure out modern web development "stacks". Svelte? Bootstrap? Somebody talk to me!

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Her subject was a man wanted by the FBI for stealing $2 million. US Marshals couldn't find him and neither could three private investigators. She did.

    Poništi
  4. 1. velj

    Pretty neat trick to bypass detection.. also a good reminder that opening project files is dangerous.

    Tweet je nedostupan.
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    If you’re like me and didn’t get a seat in the AWE class, consider taking an training class instead, offers an amazing class on fuzzing and crash analysis. I learned so much when I took it

    Poništi
  6. 1. velj

    Heading to RSA/BSidesSF? I have free passes to FuzzCon where I’ll be keynoting. It’s my first time being around for RSA, let’s hang out, are there activities I should I be sure to to do?

    Poništi
  7. 29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  8. 29. sij
    Poništi
  9. proslijedio/la je Tweet
    29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  10. 27. sij

    We’ve extended discount prices two more weeks for Fuzzing training at CanSecWest in March

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  12. 25. sij
    Prikaži ovu nit
    Poništi
  13. 25. sij
    Prikaži ovu nit
    Poništi
  14. 22. sij
    Poništi
  15. proslijedio/la je Tweet
    16. sij

    REMINDER: The Call for Papers for closes on the 31st of Jan 2020! Working on something cool you want to share? Send it in!

    Poništi
  16. 14. sij

    This is the last week of early bird discounts (700 CAD) for my Fuzzing and Crash Analysis training at in Vancouver in March.

    Poništi
  17. proslijedio/la je Tweet
    18. stu 2019.

    After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy!

    Prikaži ovu nit
    Poništi
  18. 13. sij

    We are still looking for a Red Team Senior Manager at Oracle Cloud. We have a strong red team and a great offensive security team in general! Contact our Director, Adam Russell and check the link for more info.

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  20. 8. sij
    Poništi
  21. proslijedio/la je Tweet
    8. sij
    Odgovor korisniku/ci

    I use UIforETW to record the traces - it's an open-source tool I created to simplify the recording and managing of ETW traces, and it layers on a few features like input recording. For trace viewing I use Microsoft's WPA tool. For details see

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·