|
nafiez
@
zeifan
Malaysia
|
|
Information Security / Reverse Engineering / Vulnerability Research / POC, HITB & NanoSec Speaker
|
|
|
6.844
Tweetovi
|
538
Pratim
|
907
Osobe koje vas prate
|
| Tweetovi |
| nafiez proslijedio/la je tweet | ||
|
raptor
@0xdea
|
6 h |
|
CVE-2019-12180 – ReadyAPI & SoapUI command execution via malicous project file
This is a 0day vulnerability reported by my coworker @0x_nope
The timeline is interesting 🤦♂️
techblog.mediaservice.net/2020/02/cve-20…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Dave dwizzzle Weston
@dwizzzleMSFT
|
7 h |
|
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from @BlueHatIL 2019: github.com/dwizzzle/Prese…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
FireF0X
@hFireF0X
|
2. velj |
|
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
MDSec
@MDSecLabs
|
31. sij |
|
@irsdl’s first post is a writeup for an RCE in SharePoint mdsec.co.uk/2020/01/code-i…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Brett Hawkins
@h4wkst3r
|
31. sij |
|
Want to see how the @Mandiant red team weaponizes @FireEye threat intel for R&D and TTP development? Check out some research I did with @evan_pena2003 and @FuzzySec. Also includes some new executables that can be used for DLL abuse. fireeye.com/blog/threat-re…
|
||
|
|
||
|
nafiez
@zeifan
|
31. sij |
|
I heard from the crew, you dont want to claim?
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
SandboxEscaper
@SandboxBear
|
31. sij |
|
sandboxescaper.blogspot.com/2020/01/chasin… Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
j00ru//vx
@j00ru
|
30. sij |
|
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! googleprojectzero.blogspot.com/2020/01/part-i…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Walied Assar
@waleedassar
|
27. sij |
|
Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption
waleedassar.blogspot.com/2020/01/malfor…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
James Forshaw
@tiraniddo
|
30. sij |
|
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). tiraniddo.dev/2020/01/dont-u…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Leandro Barragan
@lean0x2f
|
28. sij |
|
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step: medium.com/@maxi./finding…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Jin Wook Kim
@wugeej
|
28. sij |
|
CVE-2020-2551 Weblogic RCE with IIOP
/bea_wls_internal/classes/mejb@/
weblogic.management.j2ee.mejb.Mejb_dj*#remove(Object obj)
github.com/jas502n/CVE-20…
github.com/hktalent/CVE-2… pic.twitter.com/dMhRLuiBoO
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Ryan Hausknecht
@Haus3c
|
28. sij |
|
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure
posts.specterops.io/attacking-azur…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
halvarflake
@halvarflake
|
28. sij |
|
My comments about the hubbub of AV vuln use finally being caught: Everybody with any experience knew it's going on. AV software was vuln-dev training material more than a decade ago. There were just sufficient economic reasons to ignore it until it became indisputable.
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
0x1337dtm
@0x00dtm
|
23. sij |
|
New article!
Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPC
0x00sec.org/t/anti-virus-e…
|
||
|
|
||
|
nafiez
@zeifan
|
24. sij |
|
Savage twitter.com/Wendys/status/…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
Stuart Winter-Tear
@StegoPax
|
23. sij |
|
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:
github.com/Microsoft/Appl…
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
TrustedSec
@TrustedSec
|
21. sij |
|
Senior Security Consultant @Oddvarmoe describes the discovery of a privilege escalation in the Intel Trusted Connect Service Client and how to complete the #exploit in order to obtain local admin access
hubs.ly/H0mG7VY0
|
||
|
|
||
| nafiez proslijedio/la je tweet | ||
|
SpecterOps
@SpecterOps
|
22. sij |
|
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material:
github.com/specterops/at-…
Enjoy!
For information about our current training offerings, information can be found here: specterops.io/how-we-help/tr…
(4/4)
|
||
|
|
||
|
nafiez
@zeifan
|
23. sij |
|
Interesting. Do you have more sources on this @ernamh? Thanks! twitter.com/ernamh/status/…
|
||
|
|
||