Vlad

@v1ad_o

[C]yber [S]ecurity [R]esearcher

UK
Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @v1ad_o

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @v1ad_o

  1. proslijedio/la je Tweet
    prije 15 sati

    If you wondered why AV has false positives, take a look at this excel file: 1. Runs code automatically on opening 2. Uses native APIs that manipulate memory 3. Instantiates a COM object defined in a text string in a macro Benign.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Hey Twitter, I built a thing, and I think it's pretty cool. FishCrypt is a server side database field encryption utility. PoC demo: (sign up and send me a message!) Code:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    20. sij
    Poništi
  8. proslijedio/la je Tweet
    14. sij

    The NSA advisory is much more helpful than Microsoft's.

    Poništi
  9. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  10. Poništi
  11. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  13. proslijedio/la je Tweet
    7. sij

    I know why you're here, Tweeter. I know what you've been doing... why you hardly sleep, why you live alone, and why night after night, you sit by your computer. You're looking for this kickass 0% detection obfuscation.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    7. sij

    For anyone interested in my presentation on Local RPC in .NET the HITB version is now up on YouTube.

    Poništi
  15. proslijedio/la je Tweet
    5. sij

    I have 0 CVEs. I've found many many bugs, but I don't need a CVE to prove anything. If you seemingly think a CVE makes you l337, you need to rethink.

    Poništi
  16. proslijedio/la je Tweet
    2. sij

    To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t

    Poništi
  17. proslijedio/la je Tweet
    1. sij

    On the nerd side, we are starting the lab videos and have the first one lined up. Yes. we are gonna become YouTubers, heaven help you all, featuring and guests (sorry, more like people we force into doing it whilst smiling)

    Poništi
  18. proslijedio/la je Tweet
    30. pro 2019.

    This is soooo useful. has a repo comprised of all ETW instrumentation manifests and classic MOF event schemas. If you ever want a reference to help answer "is there an event for THIS?", bookmark this. 🔥💯

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  20. proslijedio/la je Tweet

    Three years after 2016 election, we still don't know extent of Russian hacking efforts. Gov reports say Russians hacked an elections tech company & installed malware on its network. But the company says no. Here's my deep dive into that enduring mystery

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·