Twitter | Pretraživanje | |
Pretraživanje Osvježi
Abhisek Datta 11. lis
Odgovor korisniku/ci @HackSysTeam @bsidesdelhi
Fuzzing closed source applications using by
Reply Retweet Označi sa "sviđa mi se"
Aaron Imperial 16. sij
Reply Retweet Označi sa "sviđa mi se"
expend 20. pro
Qt Gif parsing null deref rediscovered with
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 11. pro
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing
Reply Retweet Označi sa "sviđa mi se"
expend 6. stu
A bit more info about fuzzing 3rd party image viewers for Windows
Reply Retweet Označi sa "sviđa mi se"
expend 10. lis
Here is how I found several CVEs with
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 19. ruj
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU
Reply Retweet Označi sa "sviđa mi se"
expend 27. kol
Some bugs I've discovered recently with . It's in 3rd party image viewer on windows: ACDSsee, XnView, FastStone and I IrfanView. There are 20+ CVEids but It seems it's not so simple to build least one exploit on top of it
Reply Retweet Označi sa "sviđa mi se"
Hardik Shah (हार्दिक शाह) 15. lip
added option to AFL_Runner.py to first run winafl with drrun.exe in debug mode to generate log.
Reply Retweet Označi sa "sviđa mi se"
Hardik Shah (हार्दिक शाह) 3. lip
Releasing a quick and dirty script i coded, afl_runner.py . winafl takes lot of arguments and a user might make some mistake in passing parameters. with this script, you can configure different parameter once and then run it when you want.
Reply Retweet Označi sa "sviđa mi se"
Hardik Shah (हार्दिक शाह) 20. tra
The hardest part in fuzzing with is writing a harness. Rest win AFL will take care 😎
Reply Retweet Označi sa "sviđa mi se"
SocialandTech 26. velj
Reply Retweet Označi sa "sviđa mi se"
🔮WZor👁️ 22. velj
😯Extracting a 19 Year Old Code Execution from -> 👉In this article, we tell the story of how we found a logical bug using the fuzzer and exploited it in to gain full control over a victim’s computer.
Reply Retweet Označi sa "sviđa mi se"
jfersec 20. velj
*UNREGISTERED VERSION* aka 99% of winrar installs 🤣
Reply Retweet Označi sa "sviđa mi se"
CyberTeam 3. sij 2019.
Tra il 2016 e il 2018 le vulnerabilità scoperte sono raddoppiate. Secondo uno studio di ciò può essere dovuto alla crescente popolarità assunta dai "". Interessante esperimento su Reader.
Reply Retweet Označi sa "sviđa mi se"
Fady Othman 23. pro 2018.
My first DLL reversing, writing harness for , wish me some crashes
Reply Retweet Označi sa "sviđa mi se"
Francesco Bussoletti 19. pro 2018.
53 new critical vulnerabilities discovered thanks to . experts performed a 50-day experiment with . Automatic vulnerability-finding tools use is increasing against threats
Reply Retweet Označi sa "sviđa mi se"
Rob Pomeroy | CISSP | Solicitor 18. pro 2018.
Interesting. WinAFL automation discovered 53 CVEs in Adobe Reader:
Reply Retweet Označi sa "sviđa mi se"
SecurityTrails 16. pro 2018.
Excellent research article on finding 50 Adobe Reader vulnerabilities in 50 days using using automatic vulnerability finding tools (also known as "fuzzers).
Reply Retweet Označi sa "sviđa mi se"
0xba3ba4 12. pro 2018.
Great research work relying on fuzzer.
Reply Retweet Označi sa "sviđa mi se"