Tweetovi

Blokirali ste korisnika/cu @yarlob

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @yarlob

  1. proslijedio/la je Tweet
    24. sij

    This weekend is your last chance to vote for the Top 10 (new) Web Hacking Techniques of 2019! Voting closes Monday.

    Poništi
  2. 13. sij

    So this is what it was about... Glad I could help :)

    Poništi
  3. proslijedio/la je Tweet
    10. stu 2019.

    Just wrote a short blog post about a win32k info leak I found earlier this year:

    Prikaži ovu nit
    Poništi
  4. 4. stu 2019.

    So overhyped. Not a single word in the article that is works on Win7 only (well until someone weaponized his sandbox escape). But if you look closer at the screenshot you see "Windows NT 6.1" check :)

    Poništi
  5. proslijedio/la je Tweet
    25. lis 2019.

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    Poništi
  6. proslijedio/la je Tweet
    23. lis 2019.

    We added AddressSanitizer (ASan) support to MSVC in the latest Visual Studio preview. So now you can not only use it for applications targeting Linux from VS, but Windows too, to find runtime memory issues fast:

    Poništi
  7. proslijedio/la je Tweet
    20. lis 2019.

    So apparently NordVPN was compromised at some point. Their (expired) private keys have been leaked, meaning anyone can just set up a server with those keys...

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. lis 2019.

    Our guy, , had a presentation at OWASP Poland Day about exploiting prototype pollution to RCE on the example of Kibana, by abusing environmental variables in node. The slides are here: We will also release a writeup soon so stay in touch!

    Poništi
  9. proslijedio/la je Tweet
    7. lis 2019.

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Poništi
  10. 13. lis 2019.
    Poništi
  11. proslijedio/la je Tweet

    Windows‌ ‌Exploitation‌ ‌Tricks:‌ ‌Spoofing‌ ‌ Named‌ ‌Pipe‌ ‌Client‌ ‌PID‌

    Poništi
  12. proslijedio/la je Tweet
    5. ruj 2019.

    It has come to my attention that it is not at all clear that ’s Cryptopals Set 8 is public, and has been for awhile:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    A very deep dive into iOS Exploit chains found in the wild

    Poništi
  14. proslijedio/la je Tweet

    Yea, I've got 3 hours to kill here in this airport lounge waiting for the next leg of my flight, so let's discuss the "OSI Model". There's no such thing. What they taught you is a lie, and they knew it was a lie, and they didn't care, because they are jerks.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. kol 2019.

    In multiple recent disclosure discussions on Twitter, I had said I will write a longer blog post about my views. I finally found the time to jot them down. I expect almost every reader to disagree with something vehemently. Enjoy "Disclosure Rashomon":

    Poništi
  16. proslijedio/la je Tweet
    16. kol 2019.

    Another great work from — A Remotely Controlled Malicious Injecting Cable for less than 10$

    Poništi
  17. 13. kol 2019.

    It turns out it was possible to reach across sessions and violate NT security boundaries for nearly twenty years, and nobody noticed.

    Poništi
  18. proslijedio/la je Tweet
    10. kol 2019.

    With Vegas over and done with for another year, it's time to go Twitter dark for a while. But one last blog before I go for and hat tip to

    Poništi
  19. 8. kol 2019.

    If you have client installed on Windows, you are potentially running any program as NT AUTHORITY\SYSTEM. First they don't care they compromise your OS security model, then tries to forbid the disclosure.

    Poništi
  20. proslijedio/la je Tweet
    24. srp 2019.

    Another opening in my AppSec team :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·