Twitter | Pretraživanje | |
Federico Bento
522
Tweetovi
65
Pratim
1.004
Osobe koje vas prate
Tweetovi
Federico Bento 5. velj
Odgovor korisniku/ci @saleemrash1d @michael90187356
That's hilarious! I was wondering how you bypassed stack canaries as it's a linear buffer overflow 😂
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 5. velj
Odgovor korisniku/ci @saleemrash1d @michael90187356
Can you elaborate on the inaccuracies? The git commit message seems pretty clear
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 5. velj
Odgovor korisniku/ci @saleemrash1d
Nice! Out of curiosity, were any exploit mitigations turned off for this?
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 30. sij
Odgovor korisniku/ci @osxreverser
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 29. sij
I wonder how many of the recent OpenBSD's vulns are bugdoors 😂
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 11. sij
Odgovor korisniku/ci @Fire30_
What do you mean? :P
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 11. sij
Odgovor korisniku/ci @dwizzzleMSFT
It's fun stuff, if you're interested in details PM me
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 11. sij
Odgovor korisniku/ci @dwizzzleMSFT
Yeah, and requires little manual patching (the boring part can be mostly automated)
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 11. sij
Read-only cred structs up and running, on to task structs! 😋
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 7. sij
Who would have thought that the kernel can access a kernel page? 🤔
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 7. sij
Odgovor korisniku/ci @vnik5287
Actually, it went out in style since it was just reverted? :)
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 3. sij
Now you'll get pwned faster with exotic cpu bugs because you just revealed it on twitter :P
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 29. pro
Overall bad read:
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 13. pro
Odgovor korisniku/ci @vlad902 @epakskape @JosephBialek
Hopefully in your blogpost you specify your views on fine-grained CFI and why you're skeptical about it too
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 12. pro
CVE-2019-19726 is kinda like the new CVE-2009-4146
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 7. pro
Odgovor korisniku/ci @osxreverser
It can be done with a flag via open() directly without fcntl, or am I missing something? :P
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 7. pro
Odgovor korisniku/ci @osxreverser
O_DIRECT?
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 7. pro
Odgovor korisniku/ci @osxreverser
The best part is understanding why that's the case
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 5. pro
Odgovor korisniku/ci @paxteam @scriptjunkie1 i 3 ostali
What does that have to do with individual vulnerabilites? Which is clearly not the point of the thesis.
Reply Retweet Označi sa "sviđa mi se"
Federico Bento 5. pro
Odgovor korisniku/ci @paxteam @scriptjunkie1 i 3 ostali
Congrats to them for being so smart that they didn't notice basic security problems on your code.
Reply Retweet Označi sa "sviđa mi se"