Sebastian Neuner

@sebastian9er

Security Engineer . Loves CTFs. Opinions are my own.

Zürich, Schweiz
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @sebastian9er

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sebastian9er

  1. proslijedio/la je Tweet
    22. sij

    Ouch. The Safari tracking prevention has privacy vulnerabilities allowing worse tracking than what it was trying to prevent. Privacy engineering is *hard*. Honestly, I don't see a robust way around this one, though I haven't had enough time to sit down and really chew on it.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    7. sij

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  4. proslijedio/la je Tweet
    19. pro 2019.

    A new set of "Mac firmware security" pages are finally out, thanks to . Check it out, it's what me and my teammates at Apple had beet working on really damn hard for the last several years.

    Poništi
  5. proslijedio/la je Tweet

    USB bulk transfers in 100% pure bare metal Go are operational, emulated Gadget Zero working and tested for bulk/interrupt endpoints. Now off to implement USB over Ethernet driver for this thing. Drivers in Go with TamaGo rock!

    Poništi
  6. proslijedio/la je Tweet
    25. stu 2019.

    XSS is cool and all, but this is next level. You should all watch this to face the bugs that will plague us for the next few years at least.

    Poništi
  7. proslijedio/la je Tweet
    20. stu 2019.

    Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles

    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. 5. stu 2019.

    Excellent talk by at . I really liked the discussion on responsible disclosure (yes, I am aware of the fact that the talk was on boot security 😅 )

    Poništi
  10. proslijedio/la je Tweet
    2. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    10. lis 2019.

    I'd assume PE parsing in the Windows kernel would be well tested but surprisingly no, five such bugs were fixed last Patch Tuesday, all found by fuzzing. They crashed the OS as soon as they'd be written to disk or worst case viewed in Explorer. Details:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    We recently found that some email addresses and phone numbers provided for account security may have been used unintentionally for advertising purposes. This is no longer happening and we wanted to give you more clarity around the situation:

    Poništi
  13. proslijedio/la je Tweet
    7. lis 2019.

    If you're planning to attend Dragon CTF 2019, you might want to take a look at this post:

    Poništi
  14. proslijedio/la je Tweet

    Enable the microphone remotely without interaction in Signal 😮

    Poništi
  15. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    19. ruj 2019.

    That was silly But I also just found 50 bugs in codebase by grepping for "type [[:alnum:]]+ error". Everybody does exactly that! Does "type Foo error" ever make sense? Casting from error doesn't Should be pointed by static analysis?

    Poništi
  17. proslijedio/la je Tweet

    LastPass could leak the last used credentials due to a cache not being updated. This was because you can bypass the tab credential cache being populated by including the login form in an unexpected way!

    Poništi
  18. proslijedio/la je Tweet

    Open infinite incognito windows in Chrome OS from a webpage, PoC in a tweet!: <form action="" method="POST"><input type="submit" name="incognito" value="1" id="a" /></form><script>setInterval(function(){document.getElementById("a").click();},100);</script>

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    The dumbest of the takes going around on the iOS 0days discovered by Google: “How would Google like it if Apple did the same thing to Android?” No idea how Google would like it, but as someone who relies on these products, I think it would be awesome.

    Poništi
  20. proslijedio/la je Tweet
    6. ruj 2019.

    Huge thanks to PoC developers and , and to , , , , , , and , all of whose work was key in both exploit development + enhancements that will serve MSF users well beyond BlueKeep.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·