Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @stalkr_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stalkr_
-
StalkR proslijedio/la je Tweet
If you're interested in Samsung's TrustZone, the talk I gave at
#BHUSA2019 is online. It presents the work we did with@NeatMonster_ and@patateQbool at@quarkslab. We are at#36c3 if you want to come say hi. :)https://youtu.be/uXH5LJGRwXIHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-2.html … by
@NeatMonster_,@patateQbool and@pandasec_Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-1.html … by
@NeatMonster_,@patateQbool and@pandasec_Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow! https://googleprojectzero.blogspot.com/2019/12/sockpuppet-walkthrough-of-kernel.html …https://www.youtube.com/watch?v=YV3jewkUJ54 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
We open sourced PathAuditor: a tool for Linux that
@rozek_marta and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: https://github.com/google/path-auditor … Blog post:https://security.googleblog.com/2019/12/detecting-unsafe-path-access-patterns.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. https://github.com/0vercl0k/CVE-2019-11708 …pic.twitter.com/LeAOCgqpMG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The Gomium Browser - Exploits https://blog.stalkr.net/2019/12/the-gomium-browser-exploits.html … different approaches including an unexpected Go compiler bug, well done
@NetanelBenSimon@hama7230@dmxcsnsbh & others!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Better late than never. Official writeup repo from A*0*E release, along with the aforementioned tricky exp in the gomium challenge.https://github.com/A-0-E/writeups
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
We just released the challenges of this year's
#GoogleCTF finals together with a short write up of the intended solutions: https://github.com/google/google-ctf/blob/master/2019/finals/solutions.pdf … If anything is not clear, feel free to DM me and I can share more details about the challenges.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Paged Out! #2 https://pagedout.institute/ Thanks to all the authors and the institute! Enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
my exploit for gomium browser
#GoogleCTF 2019 Finalshttps://gist.github.com/hama7230/fa53db62313c0b326fea49a0d0180ac4 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The Gomium Browser
#GoogleCTF 2019 finals challenge https://blog.stalkr.net/2019/11/the-gomium-browser-google-ctf-2019.html … - congrats to the 5 teams who solved it!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Here is my writeup for gomium from
#GoogleCTF 2019 finals.https://github.com/netanel01/ctf-writeups/blob/master/googlectf/2019/pwn_gomium/README.md …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel: https://www.openwall.com/lists/oss-security/2019/11/02/1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
I couldn't find a working RIDL exploit on the internet so I made it a challenge at the
#GoogleCTF. 5/10 teams solved it in under 24h. I heard at least@dsredford will publish an exploit soon, stay tuned ;)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Paged Out! #1 is out! (and it's free to download!) https://pagedout.institute/?page=issues.php … There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy!
#PagedOut!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
Released the materials for the
@defcon#workshop by@0vercl0k and I: modern debugging with#windbg (https://github.com/hugsy/defcon_27_windbg_workshop/ …), including the cheatsheet to get you started. Thanks to all of those who attended, and feedback are always welcome!pic.twitter.com/gWD5AaSYNY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
During
#DEFCON Quals we discovered CPU-level errata... and then we exploited it: http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ …#Intel#TSX#shellcodingpic.twitter.com/HNYCB1hR2S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
StalkR proslijedio/la je Tweet
LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!! And now they are trolling the
#fbctf scoreboard by redirecting users to their Google CTF website... (We finished 5th btw by solving 27/33 challenges.)pic.twitter.com/676oe9swt0
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.