Twitter | Pretraživanje | |
Mehdi Talbi
Security Researcher.
914
Tweetovi
356
Pratim
1.567
Osobe koje vas prate
Tweetovi
Mehdi Talbi 2. velj
Odgovor korisniku/ci @PaulWebSec @newsoft
les deux ;-)
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 1. velj
Odgovor korisniku/ci @BerettaVexee @newsoft
je note ca pour les prochains tweets de l’événement :-)
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 31. sij
Après BiereSecu Paris, BiereSecu Toulouse, Le BiereSecu arrive à Lyon le 13 Février !! Ca se passera au Peaky Blinders
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 29. sij
Odgovor korisniku/ci @daveaitel
She is absolutely wrong :-p. There is only one syntax
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Marina Minkin 27. sij
Finally, the wait is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs: , Andrew Kwong, Daniel Genkin and
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Root-Me 27. sij
Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Saar Amar 23. sij
Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 22. sij
kernel exploit by with a nice smep bypass
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Vitaly Nikolenko 16. sij
I'll make my tech report and poc public soon. It was a fun bug affecting most major distributions. one exploit to rule them all w/ all kernel expl mitigation bypasses - no rop chains / hardcoded crap
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Synacktiv 14. sij
Fifty shades darker: no safe wor(l)d in SMM by
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 14. sij
Odgovor korisniku/ci @_argp
"I repeat: do not use spinlocks in user space, unless you actually know what you're doing. And be aware that the likelihood that you know what you are doing is basically nil." :D
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
~ 28. pro
untethered+unsandboxed code execution based on /cc
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Fire30 30. pro
Also while I am on twitter :P PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00. Uses bug from:
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Andy Nguyen 21. pro
Decided to release the ROP chain source code of h-encore²:
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Cutter 6. ruj
Odgovor korisniku/ci @radareorg
Ghidra's decompiler is written in C++, hence it was trivial to implement a full integration. The new version of Cutter is shipped with a new plugin we wrote for Cutter and . NO JAVA INVOLVED. You can find the plugin and more info here --> >>
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Synacktiv 20. pro
"Hey la Kibana, Inspection des gadgets !" 😋 Pwning Kibana 6.2 using prototype pollution and CVE-2018-17246 by
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Hanqing Zhao 13. pro
I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi 12. pro
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
buherator 11. pro
Qualys Security Advisory - Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726) < Beautiful! Wonder how found it?
Reply Retweet Označi sa "sviđa mi se"
Mehdi Talbi proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"