Tweetovi

Blokirali ste korisnika/cu @stalkr_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stalkr_

  1. proslijedio/la je Tweet
    27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  2. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  5. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    We open sourced PathAuditor: a tool for Linux that and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: Blog post:

    Poništi
  7. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  8. 6. pro 2019.

    The Gomium Browser - Exploits different approaches including an unexpected Go compiler bug, well done & others!

    Poništi
  9. proslijedio/la je Tweet
    4. pro 2019.

    Better late than never. Official writeup repo from A*0*E release, along with the aforementioned tricky exp in the gomium challenge.

    Poništi
  10. proslijedio/la je Tweet
    19. stu 2019.

    We just released the challenges of this year's finals together with a short write up of the intended solutions: If anything is not clear, feel free to DM me and I can share more details about the challenges.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. 7. stu 2019.

    The Gomium Browser 2019 finals challenge - congrats to the 5 teams who solved it!

    Poništi
  14. proslijedio/la je Tweet
    6. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    2. stu 2019.

    I just did the full disclosure of the exploitable bugs in the 'vivid' driver of the Linux kernel:

    Poništi
  16. proslijedio/la je Tweet
    3. stu 2019.

    I couldn't find a working RIDL exploit on the internet so I made it a challenge at the . 5/10 teams solved it in under 24h. I heard at least will publish an exploit soon, stay tuned ;)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    11. kol 2019.

    Released the materials for the by and I: modern debugging with (), including the cheatsheet to get you started. Thanks to all of those who attended, and feedback are always welcome!

    Poništi
  19. proslijedio/la je Tweet
    26. lip 2019.

    During Quals we discovered CPU-level errata... and then we exploited it:

    Poništi
  20. proslijedio/la je Tweet
    3. lip 2019.

    LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!! And now they are trolling the scoreboard by redirecting users to their Google CTF website... (We finished 5th btw by solving 27/33 challenges.)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·