ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@Saif_Sherei ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @Saif_Sherei ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
The previously discussed MS16-098 writeup :) https://sensepost.com/blog/2017/exploiting-ms16-098-rgnobj-integer-overflow-on-windows-8.1-x64-bit-by-abusing-gdi-objects/ … Modified exploit code link: https://github.com/sensepost/ms16-098 …
-
0x5A1F Retweeted
Learn about USB wifi C&C attacks with
@RoganDawes from@sensepost on our latest from@hackerwarehouse -> https://youtu.be/HLmqC07k1Ww@wctf_us -
0x5A1F Retweeted
Proof-of-Concept local root exploit for the double-free in Linux kernel DCCP implementation (CVE-2017-6074):https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-6074 …
-
0x5A1F Retweeted
Vulnerability Deep Dive - Ichitaro Office Excel File Code Execution Vulnerability http://blog.talosintelligence.com/2017/02/vulnerability-deep-dive-ichitaro-office.html … (using mona.py)
-
0x5A1F Retweeted
Cloudflare have been leaking customer HTTPS sessions for months. Uber, 1Password, FitBit, OKCupid, etc. https://bugs.chromium.org/p/project-zero/issues/detail?id=1139 …
-
0x5A1F Retweeted
I knew you were hiding their
@lokihardt ! https://bugs.chromium.org/p/project-zero/issues/detail?id=1040 …#awesome -
0x5A1F Retweeted
Edge adds the option for mandatory code signing enforcement and blocking of new executable pages. Killer with cfg.https://blogs.windows.com/msedgedev/2017/02/23/mitigating-arbitrary-native-code-execution/ …
-
0x5A1F Retweeted
New blog post: Windows Kernel Local Denial-of-Service #1: win32k!NtUserThunkedMenuItemInfo (Windows 7-10), http://j00ru.vexillium.org/?p=3101
-
0x5A1F Retweeted
Windows driver signature bypass by derusbi - http://www.sekoia.fr/blog/windows-driver-signing-bypass-by-derusbi/ … Driver Signature Enforcement (by
@j00ru) - http://j00ru.vexillium.org/?p=377 -
0x5A1F Retweeted
Bypass DEP and CFG using JIT compiler in Chakra engine by tencent xlab: http://xlab.tencent.com/en/2015/12/09/bypass-dep-and-cfg-using-jit-compiler-in-chakra-engine/ …
-
0x5A1F Retweeted
NetBSD leaks 249 bytes over Ethernet (ARP) http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc … Linux <2.0.40 leaks 20 bytes over Internet (ICMP) http://lists.openwall.net/full-disclosure/2003/06/09/5 …
-
0x5A1F Retweeted
[RECON brussels slides] Your Chakra Is Not Aligned - Hunting bugs in the Microsoft Edge Script Engine by
@natashenka https://recon.cx/2017/brussels/resources/slides/RECON-BRX-2017-Your_Chakra_Is_Not_Aligned.pdf … -
0x5A1F Retweeted
Here's the code/dll x86 for now/ should work as normal user https://github.com/subTee/RegistrationFreeCOM … DLL inject via ActCTX COM Object https://msdn.microsoft.com/en-us/library/windows/desktop/aa375644(v=vs.85).aspx …
-
0x5A1F Retweeted
Happy SensePost day! Seventeen years strong. Remember the original office in RT's bedroom?pic.twitter.com/G3EoadEeoA
-
0x5A1F Retweeted
We founded
@SensePost 17 years ago today. I'm proud of every year and its never been a better place then it is today. The future is bright! -
0x5A1F Retweeted
@mwrlabs GDI object leaks in v1607+ illustrated with a universal x64 exploit for Capcom.sys (available in MSF) - https://github.com/FuzzySecurity/PSKernel-Primitives/blob/master/Sample-Exploits/Capcom/CapCom-GDI-x64Universal.ps1 …pic.twitter.com/iG0Cgndj5J
-
0x5A1F Retweeted
Dr
@fransla continuing our pwning financial systems series by schooling@sensepost'ers on Financial Information eXchange (FIX).pic.twitter.com/kfNf62ITqT
-
0x5A1F Retweeted
Short intro into symbolic execution: https://yurichev.com/blog/symbolic/
-
0x5A1F Retweeted
i always like JS engines bugs Microsoft Edge: Use-after-free in TypedArray.sort https://bugs.chromium.org/p/project-zero/issues/detail?id=983 …
-
0x5A1F Retweeted
Hardening Windows 10 With Zero Day Exploit Mitigations Under The Microscope : https://improsec.com/blog//hardening-windows-10-with-zero-day-exploit-mitigations-under-the-microscope …pic.twitter.com/XLhrj2GXUv
-
0x5A1F Retweeted
New MSF module nearly done, based on the work of
@tifkin_ and@sekirkity, loads a .NET assembly into MSSQL and uses it to run Meterpreter.pic.twitter.com/djdyArnjYD
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
0x5A1F
Troy
Andrey Konovalov
Nicolas Krassas
Tavis Ormandy
mr_me
Ryan Stortz
j00ru//vx
b33f
Hossein Lotfi
Solar Designer
Casey Smith
SensePost
Charl van der Walt
Dominic White
Dennis Yurichev
Meysam Firouzi
Binni Shah
OJ