Twitter | Pretraživanje | |
clem
827
Tweetovi
683
Pratim
776
Osobe koje vas prate
Tweetovi
clem 5. velj
Mitigations for path redirection attacks: hardlinks will require write access to target file, junctions created from medium IL will be marked and not followed by privileged processes, SYSTEM will get its own %TEMP%
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Dave dwizzzle Weston 5. velj
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Yarden Shafir 2. velj
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Check Point Research 30. sij
Odgovor korisniku/ci @_CPResearch_
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
isis agora lovecruft (they/them) 30. sij
i believe i just did something no one has ever done before: i wrote a constant-time galois field implementation on a 6502 chipset, which not only does not have a constant-time hardware multiply instruction, but does not have a multiply instruction at all
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
James Forshaw 30. sij
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Walied Assar 27. sij
Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Hector Martin 16. sij
To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
Reply Retweet Označi sa "sviđa mi se"
clem 17. sij
Odgovor korisniku/ci @mattifestation @redcanaryco
Congrats! You’re gonna rock & inspire as usual :)
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Yarden Shafir 16. sij
After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Saleem Rashid 15. sij
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Matt Graeber 15. sij
God forbid the Audit-CVE event fires for CVE-2020-0601 but if it does and the "para" field starts with 30, it's a good chance you have a cert with custom ECC curve params. Here's how you can parse them to make sense of them.
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Matt Nelson 15. sij
[Blog] Avira VPN Local Privilege Escalation Uses some fun tricks to circumvent service DACL and integrity checks.
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Tavis Ormandy 14. sij
The NSA advisory is much more helpful than Microsoft's.
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Siguza 7. sij
New blog post. ARM hardware bug. In the specification.
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Vincent Le Toux (Paris) 30. pro
Found this gem from about kerberos in .net Bonus: the KerbDump Tool to view the ticket and even decrypt its encrypted part. From what I understand from the code, Windows only - to confirm.
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Blue Frost Security 7. sij
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
James Forshaw 2. sij
To bring in the new year here's a new blog post about empirically testing Windows Service Hardening to see if it is really not a security boundary even on Windows 10. h/t
Reply Retweet Označi sa "sviđa mi se"
clem proslijedio/la je tweet
Samuel Groß 27. pro
Slides + recording of my talk: had to omit many details, but blogpost coming soon!
Reply Retweet Označi sa "sviđa mi se"