Twitter | Pretraživanje | |
Alexandre Borges
Reverse Engineer and Security Researcher. Speaker at DEF CON (USA and China), HITB, CONFidence, NO HAT, DC2711 and others. Author of the Malwoverview tool.
6.769
Tweetovi
120
Pratim
3.016
Osobe koje vas prate
Tweetovi
Alexandre Borges 14 h
Odgovor korisniku/ci @matalaz
I'm not sure whether it is your case, but the Python I/O library on Windows systems suffers serious performance problems according to my experience. Thus, you should try to reduce excessive I/O operations (if it is possible).
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 22 h
Odgovor korisniku/ci @wolfcod @joehowwolf
Nothing. My tweet was an "educational" one. Personally, I like and use mailslot, but many people don't know on it (I am not sure about the reasons...) and, during analysis, some analysts might face problems. I agree with 's opinion: maybe it is underused.
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 23 h
Pay attention when a malware is using Mailslots (similar to named pipes) for local communication on Windows: Mailslot Server (App. Client): CreateMailslot( ) + ReadFile( ) Mailslot Client (App. Server): CreateFile( ) + WriteFile( )
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 23 h
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 4. velj
Few malware authors have been using thread's ownership changing to try to make analysis harder: void function2(std::thread x); .... std::thread function3(function1( )); function2(std::move(function3( ));
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 4. velj
EmoCheck: Emotet detection tool for Windows OS
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 1. velj
Developers have exploited the Samsung Galaxy S9 and Note 9 to get root access on the Snapdragon models:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 31. sij
(interesting write-up) Introduction to SpiderMonkey exploitation:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 31. sij
American Fuzzy Lop plus plus (afl++): afl++ is afl 2.56b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode and a lot more!
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 30. sij
People have asked whether learning about MacOS or Android reversing is worth? Yes, it's. Mobile reversing is my daily job and you should choose one of them and go forward. Official documentation is your first stop: Apple: Android:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 30. sij
Obfuscapk: A black-box obfuscation tool for Android apps
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 26. sij
GDA is a Dalvik bytecode decompiler written entirely in c++:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 23. sij
Micropatching a Workaround for CVE-2020-0674:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 21. sij
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 18. sij
No doubts, a quite interesting presentation from about the decompiler internals:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 14. sij
(excellent -- by Steven Seeley ) Busting Cisco's Beans :: Hardcoding Your Way to Hell: (write-up) PoC 1: PoC 2: PoC 3:
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 14. sij
(remember) Application -> DeviceIoControl( ) (on thread 1) -> Dispatch Routine (by I/O Manager) -> Target Driver -> Device --> Interrupt (done) -> ISR (any thread context) -> DPC (any thread context). It is NOT possible to know the thread context for ISR and DPC in advance ;)
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 13. sij
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges 12. sij
Reply Retweet Označi sa "sviđa mi se"
Alexandre Borges proslijedio/la je tweet
Florian Roth 11. sij
I've created a special branch of my Fenrir IOC scanner to detect traces of activity exploiting CVE-2019-19781 - we use strings that appear in XML & log files - please verify Fenrir branch Report by
Reply Retweet Označi sa "sviđa mi se"