Tweetovi

Blokirali ste korisnika/cu @saidelike

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @saidelike

  1. Prikvačeni tweet
    13. lip 2019.

    Today with we release BKScan, a scanner for BlueKeep Windows RDP vulnerability (CVE-2019-0708) which supports NLA -2019-0708

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Odgovor korisnicima

    I completely agree. I learn about so many cool features mostly from talking to other reversers and observing their workflows.

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    NCC Group () are now recruiting for their 2020 graduate scheme starting in July. I have just finished the scheme in Manchester so if you have any questions regarding that, or the company in general, don't hesitate to DM me 😄

    Poništi
  4. proslijedio/la je Tweet

    I'm glad to see scientists engaging actively with this issue. If you want to know it's history, here's the short and the long version of my take:

    Poništi
  5. proslijedio/la je Tweet

    The story about Saudis hacking Jeff Bezos iPhone didn't find evidence, but unknowns, such as a suspicious encrypted video they couldn't decrypt. So I wrote a blogpost with a detailed explanation how to decrypt it:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Grr.. if anyone knows why macOS stops producing panic logs after about 10 kernel panics + reboots on t2 devices (In ProxiedDevice-Bridge) I would be intrigued to know and if there’s a nvram flag to fix this.

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Petite FAQ sur la faille Windows CVE-2020–0601 et la NSA à l’usage des paranoïaques

    Poništi
  8. proslijedio/la je Tweet
    21. sij

    Any tips for dealing with inlined functions in ghidra? E.g., I’d like to say “this group of blocks is definitely its own function. Please treat that as scope for variable names, etc.”

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Anyone know of a way to suppress Windbg Preview spitting out the function name when it is run via 'dx @$scriptContents.method()'. The only suggestion I found here doesn't work

    Poništi
  11. proslijedio/la je Tweet
    16. sij

    French infosec addict looking for a vulnerability researcher/pentester remote position. RT appreciated ! DMs open ;)

    Poništi
  12. proslijedio/la je Tweet
    10. sij
    Odgovor korisnicima
    Poništi
  13. proslijedio/la je Tweet
    10. sij
    Odgovor korisniku/ci

    See PSEUDOCODE_SYNCED in hexrays.cfg The default is off because our decompiler usually produces good code. In the worst case, Tab can be used to switch between the views, which is more convenient and saves the screen estate.

    Poništi
  14. proslijedio/la je Tweet
    7. sij
    Poništi
  15. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  16. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  17. proslijedio/la je Tweet
    30. pro 2019.

    Marc Trévidic, qui a passé 10 ans au pôle antiterrorisme au tribunal de Paris, ouvre sa chaîne Youtube, et c'est passionnant : Merci !

    Poništi
  18. proslijedio/la je Tweet
    29. pro 2019.

    Learning modern binary exploitation can very rewarding, albeit equally challenging. It is analogous to learning other art forms. This is going to be a thread!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.

    What is the best collaborative plugin for IDA Pro?

    Poništi
  20. 19. pro 2019.

    Any interest for a new Windows kernel exploitation training on Windows 10 focusing on methodology and hands on exploitation? Analyzing one bug step-by-step from patch diffing up to exploitation, with a focus on generically targeting a previously unknown kernel component.

    Poništi
  21. 18. pro 2019.

    Hey, what is the best tool people use to parse pdb files to get functions prototypes?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·