Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @vm_call
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vm_call
-
Prikvačeni tweet
First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem" https://vmcall.blog/nt/2019/10/18/kernel_gdi_hook.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Carl Schou / vm proslijedio/la je Tweet
Quick read about how our anti-cheat is becoming sentienthttps://www.reddit.com/r/leagueoflegends/comments/eybl03/new_anticheat_system_in_lol_and_other_upcoming/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Okay guys, enough with the jokes. Why are cheaters renaming themselves to "vm_call fan"
https://twitter.com/HecticPXL/status/1222775828456640517 …
0:34Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I ported https://vmcall.blog/ from Jekyll to Wordpress in hopes that the "comments" feature would be used to provide meaningful commentary to my content. Let's just say that I am pleased with my decisionpic.twitter.com/mbiJ8IWPus
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Carl Schou / vm proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hackers have been abusing a poor integrity check in BattlEye to completely circumvent game protection mechanisms. This has allowed cheat communities to intercept and modify every single piece information sent by the anti cheat to the respective servers. https://vmcall.blog/battleye-communication-hook/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
BattlEye has begun virtualising all new shellcode, 1:0 to the secret club. Confirms that the developers are lurking my twitter - next article will be released shortly, which will allow you to hook BattlEye while bypassing their internal integrity checks :) stay put
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Carl Schou / vm proslijedio/la je Tweet
PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only. https://github.com/ollypwn/BlueGate …pic.twitter.com/R43AHUwGV0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
FE CTF 2019 write-up by national champion
@floofstrid (coincidentally, a fellow secret club member
)https://astr.cc/blog/fe-ctf-2019-writeup/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Here's a full write-up of the danish intelligence agency's CTF. I might publish my Femtium (custom RISC architecture used in the CTF) -> x86 converter and optimizer, which enabled me to reverse engineer the applications in good old IDA Pro :-)https://twitter.com/CitadelArcho/status/1219341477429547008 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This hit major providers that haven't previously been detected in the past 6 months :-)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#BattlEye have updated their detections of hypervisor-based cheats. This happens under a week after@daax_rynd and I published an article on how to improve the time-based detections. *shrug* that's what you get for pasting hvpp/ddimonPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Carl Schou / vm proslijedio/la je Tweet
PoC for CVE-2020-0601
#x509#crypt32 https://github.com/ollypwn/cve-2020-0601 …pic.twitter.com/gg5toHwpht
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The secret club does it again. Whose side are we even on?https://twitter.com/daax_rynd/status/1217175553452756992 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anticheats such as BattlEye have been trying to detect generic hypervisors, in particular those prevalent in the cheating community (DdiMon and hvpp), by using time-based detections. Here's some advice on that for the developers. https://vmcall.blog/battleye-hypervisor-detection/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We of course can't say if there's been added anything to this module in the past week, but the module heavily relies on a vectored exception handler which will absolutely kill performance if virtualized, therefore explaining the drastic overhead.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Okay ignore this tweet, that was our monitor tool hitting the timeout limit of 60 seconds. Actual execution time was 110 seconds on a very high end machine = 11000% overhead due to the new obfuscation, have fun playing DayZ on your low end machines
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The virtualized BEClient2 now takes over 60 seconds to run thanks to virtualization overhead, the execution time before was under a second - you guys need any help?
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Obfuscation sadly doesn't work retroactively - shoe on head or i drop the entire write-up of your disastrous stack scanner
@TheBattlEyePrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
BattlEye has now begun fully virtualizing BEClient2 after my last tweet, too bad I already dumped it ;)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And yes, you read that correctly, literally the entire driver on disk will be sent over UDP if it matches a very vague name check :( ouch oof oowie my intellectual property
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.