Brian Beaudry

@sizzop

"Security" Researcher. Once hacked a Gibson in under 7 minutes. Gangster Ida courtesy of

Vrijeme pridruživanja: svibanj 2011.

Tweetovi

Blokirali ste korisnika/cu @sizzop

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sizzop

  1. proslijedio/la je Tweet
    , , i još njih 3
    Poništi
  2. proslijedio/la je Tweet

    The cloud is just Jeff Bezos's computer.

    Poništi
  3. prije 22 sata

    Ok I'll bite. Here's $1 for ,

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Yearly reminder that by is awesome sauce 👌

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Attendjng Tampa BSides ? Please register for the CTF (developed/hosted by here: CTF will open day before the con with a fun/challenging simulated pentest/AD lab built by the amazing ... traditional CTF the day of the con

    Poništi
  7. proslijedio/la je Tweet
    10. pro 2019.

    We present TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at

    , , i još njih 3
    Poništi
  8. 28. sij

    “Right now, we’re getting into iPhones. A year ago we couldn’t get into iPhones, but we could get into all the Androids. Now we can’t get into a lot of the Androids.”

    Poništi
  9. proslijedio/la je Tweet
    25. sij

    Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"

    Poništi
  10. proslijedio/la je Tweet
    25. sij
    Poništi
  11. proslijedio/la je Tweet
    24. sij

    Summary of chapter 4 "How To Go About Creating A Program" taken from "Programming the IBM 1620: The Hands-On Approach", 1965.

    Poništi
  12. 24. sij

    Honestly if your code doesn't have the occasional ascii art, what are you even doing?

    Poništi
  13. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    21. sij

    Microsoft Windows 10 (19H1 1901 x64) ws2ifsl.sys Use After Free Local Privilege Escalation (kASLR kCFG SMEP)

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    In his privilege escalation workshop, covers ETW service triggers as a potential escalation primitive. Amazing material in here.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. sij

    You can now try out VMware and Hyper-V together! Which means you can run WSL2 without giving up access to VMware 🎉

    Poništi
  17. proslijedio/la je Tweet
    20. sij

    Reverse engineering is mostly about naming stuff

    Poništi
  18. proslijedio/la je Tweet
    22. sij

    sometimes you may not want to break out of your exploited app; it may have all the data you need, all ready for exfil via memory-resident bad stuff probably especially true for mobiles where apps generally live forever and devices are rarely rebooted

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    20. sij

    Yesssssss, a rational understanding of APTs as human organizations vs. space-laser wielding omnipotent and omniscient adversaries.

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    Ep 57: MS08-067 With special guest . Hear what goes on internally when Microsoft discovers a major vulnerability within Windows.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·