Tweetovi

Blokirali ste korisnika/cu @vm_call

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vm_call

  1. Prikvačeni tweet
    19. lis 2019.

    First part of my kernel hacking mini-series: "Hooking the graphics kernel subsystem"

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. 2. velj

    Okay guys, enough with the jokes. Why are cheaters renaming themselves to "vm_call fan" 😅

    Poništi
  4. 26. sij

    I ported from Jekyll to Wordpress in hopes that the "comments" feature would be used to provide meaningful commentary to my content. Let's just say that I am pleased with my decision

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  6. 24. sij

    Hackers have been abusing a poor integrity check in BattlEye to completely circumvent game protection mechanisms. This has allowed cheat communities to intercept and modify every single piece information sent by the anti cheat to the respective servers.

    Prikaži ovu nit
    Poništi
  7. 24. sij

    BattlEye has begun virtualising all new shellcode, 1:0 to the secret club. Confirms that the developers are lurking my twitter - next article will be released shortly, which will allow you to hook BattlEye while bypassing their internal integrity checks :) stay put

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  9. 21. sij

    FE CTF 2019 write-up by national champion (coincidentally, a fellow secret club member💪🏻)

    Poništi
  10. 20. sij

    Here's a full write-up of the danish intelligence agency's CTF. I might publish my Femtium (custom RISC architecture used in the CTF) -> x86 converter and optimizer, which enabled me to reverse engineer the applications in good old IDA Pro :-)

    Poništi
  11. 20. sij

    This hit major providers that haven't previously been detected in the past 6 months :-)

    Prikaži ovu nit
    Poništi
  12. 20. sij

    have updated their detections of hypervisor-based cheats. This happens under a week after and I published an article on how to improve the time-based detections. *shrug* that's what you get for pasting hvpp/ddimon

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    15. sij
    Poništi
  14. 14. sij

    The secret club does it again. Whose side are we even on?

    Poništi
  15. 14. sij

    Anticheats such as BattlEye have been trying to detect generic hypervisors, in particular those prevalent in the cheating community (DdiMon and hvpp), by using time-based detections. Here's some advice on that for the developers.

    Poništi
  16. 14. sij

    We of course can't say if there's been added anything to this module in the past week, but the module heavily relies on a vectored exception handler which will absolutely kill performance if virtualized, therefore explaining the drastic overhead.

    Prikaži ovu nit
    Poništi
  17. 14. sij

    Okay ignore this tweet, that was our monitor tool hitting the timeout limit of 60 seconds. Actual execution time was 110 seconds on a very high end machine = 11000% overhead due to the new obfuscation, have fun playing DayZ on your low end machines

    Prikaži ovu nit
    Poništi
  18. 14. sij

    The virtualized BEClient2 now takes over 60 seconds to run thanks to virtualization overhead, the execution time before was under a second - you guys need any help?

    Prikaži ovu nit
    Poništi
  19. 14. sij

    Obfuscation sadly doesn't work retroactively - shoe on head or i drop the entire write-up of your disastrous stack scanner

    Prikaži ovu nit
    Poništi
  20. 14. sij

    BattlEye has now begun fully virtualizing BEClient2 after my last tweet, too bad I already dumped it ;)

    Prikaži ovu nit
    Poništi
  21. 13. sij

    And yes, you read that correctly, literally the entire driver on disk will be sent over UDP if it matches a very vague name check :( ouch oof oowie my intellectual property

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·