Twitter | Pretraživanje | |
renorobert
931
Tweetovi
553
Pratim
987
Osobe koje vas prate
Tweetovi
renorobert proslijedio/la je tweet
Andrea Fioraldi 14. pro
I repropose my notes about x86, Linux and virtualization in a single text file (~2500 lines only) for my fellow students in Sapienza.
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Brandon Falk 23. stu
Pro-tip. Ever wonder what a structure _actually_ looks like in memory when it's full of unions, typedefs, etc? The `pahole` command (from the `dwarves` package) can take in an ELF with DWARF symbols and output the structures unrolled recursively. Example:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
David Chiang 23. lis
Published the write-up of PoE - Path of Exploitation for HITCON CTF! Includes why and how I designed these challenges and how to exploit from the userspace program, the kernel, to QEMU!
Reply Retweet Označi sa "sviđa mi se"
renorobert 18. lis
can I DM you regarding a submission to Intel?
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Sebastian Österlund 17. lis
Odgovor korisniku/ci @themadstephan @vu5ec i 2 ostali
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Giuseppe `N3mes1s` 13. ruj
bhyvearm64: cpu and memory virtualization on ARMv8.0-A -
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Federico Bento 13. ruj
"Control-Flow Integrity for the Linux kernel: A Security Evaluation" is the work I've done for my Masters thesis where I analyze how the PaX Team's (public) RAP holds up to stop ROP when applied to the Linux kernel. You may want to check out chapter 3.
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
grsecurity 11. ruj
Patch-gapping is also highly relevant to the Linux kernel, where known vulns sit in the syzkaller dashboard or wait months for batches of fixes to be deployed in distro kernels
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
VUSec 10. ruj
Odgovor korisniku/ci @mik__ @bjg i 3 ostali
More information on our project page:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Andrey Konovalov 4. ruj
A Linux kernel CTF task that relies on a double-fetch/data-race introduced by the compiler for exploitation:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
K³ 30. kol
Short follow-up blog post about the research on reference counter overflows. This time: Exploiting mqueuefs and how an was identified during this. Full exploit included ;-)
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
teambi0s 20. kol
Writeup for VM Escape found by our team member : In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Brandon Falk 19. kol
Sushi Roll: A CPU research kernel with minimal noise for cycle-by-cycle micro-architectural introspection
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Mehdi Talbi 25. srp
Some of my notes on exploiting a FreeBSD Kernel vulnerability. Thanks
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
night_f0x 17. srp
Here we go! My first VM Escape in qemu with default configuration. Will publish the exploit and more details when its fixed. Thanks and for the inspiration and support !
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Francisco Falcon 15. srp
I wrote about CVE-2018-6924, a FreeBSD kernel memory disclosure vulnerability affecting the code that parses the ELF header of a binary prior to its execution:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Matthew Garrett 9. srp
Longer form thoughts on bug bounties, NDAs and why you shouldn't complain about people turning them down:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
RET2 Systems 26. lip
During Quals we discovered CPU-level errata... and then we exploited it:
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Tony “Abolish ICE” Arcieri 🦀 25. lip
AMD-SEV: Platform DH key recovery via invalid curve attack (CVE-2019-9836)
Reply Retweet Označi sa "sviđa mi se"
renorobert proslijedio/la je tweet
Kira 13. lip
VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience😅
Reply Retweet Označi sa "sviđa mi se"