ElfMaster

@ryan_elfmaster

Founder and CTO of Arcana CyberSolutions -- Kernel hacking, Binary reversing, exploitation, meditation & consciousness.

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @ryan_elfmaster

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ryan_elfmaster

  1. Prikvačeni tweet
    6. pro 2019.

    Looking to hire a strong C dev and Reverse engineer with knowledge of Linux internals and a deep understanding of ELF voodoo & Leadership skills. Message me for more details. if you know a possible fit please let me know.

    Prikaži ovu nit
    Poništi
  2. 30. sij

    -- Just found out the zine is out! Look out for a paper on modern ELF infection techniques with SCOP binaries.

    Poništi
  3. 25. sij

    Arcana is looking for ELF binary experts; adept in reverse engineering and software engineering in C. Linux kernel internal knowledge a huge plus. Email resumes to engineering,

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  5. 9. sij

    Living in LA for a while, not sure which of you old-school hacker buddies want to get together and catch up. I'm staying near the beach.

    Poništi
  6. 29. pro 2019.

    I am looking for Linux/UNIX ELF binary infections/injectors, process memory infections, and kernel rootkits and any other APT's that are being used in the wild. Upload here -- Thank you.

    Poništi
  7. 28. pro 2019.

    Very nice work, way better code than the original :)

    Poništi
  8. 15. pro 2019.

    Anyone have a good referral? This particular position is very important

    Prikaži ovu nit
    Poništi
  9. 12. pro 2019.

    Someone re-wrote readelf with libelfmaster:

    Poništi
  10. 11. pro 2019.

    Understand attack surface of statically linked binaries in Linux and learn how to harden them

    Poništi
  11. proslijedio/la je Tweet
    5. pro 2019.

    con this Saturday Patrick and I will be talking about our new fuzzer! We build a fuzzer that can detect new inputs to a target and automatically fuzz them, all without any manual harnessing required. We also have tons of cool data to show off. Here is a sample: 1/n

    Prikaži ovu nit
    Poništi
  12. 15. stu 2019.

    A version of readelf using libelfmaster by BowlSlaw@gitlhub -

    Poništi
  13. 14. stu 2019.

    Oh, heads up this uses a reverse text padding infection to host the new dynamic strying table. Reverse text padding infections don’t work on position independent executables. So the infection technique should be switched over to something else like a PT note to PT load conversion

    Prikaži ovu nit
    Poništi
  14. 14. stu 2019.

    $ ./inject ./shell $ sudo cp /lib/x86_64-linux/gnu/ $ sudo ldconfig $ ./shell >> whoami elfmaster >> ^C $ cat keylogger.txt whoami

    Prikaži ovu nit
    Poništi
  15. 14. stu 2019.

    Wrote a shared library injector (i.e. DT_NEEDED infect) that comes with a simple keylogger. Keyloggers are awesome.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    11. stu 2019.

    Heap Exploitation by & Malware Reversing by at the last CSides of 2019 this Friday

    Poništi
  17. 13. stu 2019.

    Find hidden processes in the kernel via /proc/kcore

    Poništi
  18. 13. stu 2019.

    Some basic research into stripping the dynamic symbol table of ELF executables.

    Poništi
  19. 4. stu 2019.

    Anyone Have some good updates resources to the latest Linux kernel and elf/memory backdoors ?

    Poništi
  20. proslijedio/la je Tweet
    29. lis 2019.

    a myth from the same academic jokers^Wresearchers who graced us with their ASLR 'research' in the past: in table 2 shows RAP vulnerable to ret2user (it isn't, after all we invented KERNEXEC/i386 in 2003 and UDEREF in 2006 :) but everybody else not...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·