Twitter | Pretraživanje | |
Anderson Eduardo
Founder & Security Researcher
3.120
Tweetovi
2
Pratim
729
Osobe koje vas prate
Tweetovi
Anderson Eduardo 9 h
uftrace - Function (graph) tracer for user-space
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Frank Denis 2. velj
Yet another vulnerability in sudo
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Saleem Rashid 4. velj
i've written a working exploit for sudo vulnerability CVE-2019-18634. if you have "Defaults pwfeedback" (apparently the default in Linux Mint and derivatives), any user can become root without any password, even if they're not in /etc/sudoers
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Solar Designer 28. sij
Disclosure/write-up on Linux kernel user-triggerable read-after-free crash or 1-bit infoleak oracle in a userspace security hardening feature of open(2) found/analyzed/fixed by Al Viro (thus effectively by "the vendor"), which I share responsibility for:
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Saul Procterm 28. sij
Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Andrey Konovalov 29. sij
Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
raptor 2. velj
I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
raptor 2. velj
And here’s a wonderful post by OpenSMTPD’s main developer : Very interesting insight on how a bug enters the code and becomes exploitable over time.
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
majek04 4. velj
It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device. IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard.
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo 1. velj
Avoiding gaps in IOMMU protection at boot
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Bruno Oliveira 30. sij
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Sergio Prado 🐧 14. sij
What are ? What problems do they solve? What technologies are involved? LXC, ?Should we use containers to deploy applications on systems? I will try to answer these and many other questions in this article!
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Sergio Prado 🐧 29. sij
(ASan) is an instrumentation tool created by Google security researchers to identify memory access problems in and programs including buffer overflow, stack overflow, memory leak, use after free, uninitialized variable, etc!
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo 28. sij
New Safe Memory Reclamation feature in FreeBSD UMA
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo 28. sij
**PROTOTYPE** FreeBSD Jail/ZFS based implementation of the Application Container Specification
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo 28. sij
Package jail provides native FreeBSD Jail syscalls in Go
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Jerry Bryant 27. sij
Just published a blog on INTEL-SA-00329 concerning L1D Eviction Sampling. This vulnerability has little to no impact in virtual environments that have applied L1 Terminal Fault mitigations.
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Matthew Green 27. sij
New cache attack against Intel CPUs:
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo 27. sij
Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages
Reply Retweet Označi sa "sviđa mi se"
Anderson Eduardo proslijedio/la je tweet
Project Zero Bugs 27. sij
macOS/iOS: ImageIO: heap corruption when processing malformed TIFF image
Reply Retweet Označi sa "sviđa mi se"