New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP.
lock.cmpxchg8b.com/reptar.html
Thanks to @itszn13 , now you can click a play button in the #how2heap main page and start learning various heap exploitation techniques! Want to learn heap in newer libc? No problem. Just select it in the panel on the left!
Want to know if someone dumped lsass.exe? Maybe your NTFS journal keeps some #DFIR traces about *lsass*.dmp. Simple, but working!
Fully functional PoC C source code (and the compiled exe) as usual: github.com/gtworek/PSBits…
Finally had a moment to test Winlogon password leaking (a.k.a. notifying) on Windows 11. No big surprise.
And the flow is:
-user enters password
-winlogon loads mpnotify.exe
-mpnotify opens RPC channel
-winlogon sends pass via RPC
-mpnotify forwards to DLL
-DLL stores it on disk
We wanted to fuzz all 0x10ffff characters in unicode for various CSS keywords. So we built a cool fuzzer! Want to know what characters break out of CSS strings? portswigger-labs.net/css-fuzzer/ind…
Hello, I now have a streaming schedule. I'll have two educational days, and one random hacking days. There may be other unscheduled streams, but this is what the people want! twitch.tv/gamozo/schedule Tomorrow we start by getting Rust running on NT3.5 for MIPS and start hacking!
No one told me I couldn't, so I'm running a free Cloud Attack and Response workshop on 11/10 using 3 modules and 3 labs from SANS SEC504 Hacker Tools, Techniques, and Incident Response. Even if you can't attend, sign up to access the lab resources! sans.org/webcasts/tech-…
I’ve been getting quite a few inquiries about the next Advanced Fuzzing and Crash Analysis class. The next one (and last one of 2021) is November 21-24 on US Pacific time. If you can’t make it, I will continue to offer training in 2022 as well!
sectrain.hitb.org/courses/advanc…
Confirmed! The @Synacktiv team leveraged a configuration error bug to get code execution on the PR411. They earn $40,000 and 4 Master of Pwn points. They are now in a tie for 3rd in Master of Pwn standings. #Pwn2Own#P2OAustin
Success! Q. Kaiser & T. Shiomitsu from IoT Inspector Research Lab were able to get code execution on the LAN interface of the Cisco RV340 router. They head off to the disclosure call to provide the details. #Pwn2Own#P2OAustin
Success! The @Synacktiv team didn't take long getting their root shell on the WD My Cloud Series PR4100 NAS. The head off to the disclosure Zoom to provide the details. #Pwn2Own#P2OAustin
Confirmed! @theori_io used a stack-based buffer overflow to get code execution on the 3TB My Cloud Home Personal Cloud from WD. This earns them $40,000 and 4 Master of Pwn points, giving them a 1 day total of $80K and 8 points. #Pwn2Own#P2OAustin
Confirmed! The THEORI team combined an OOB Read and a stack-based overflow to take over the WD My Cloud Pro Series PR4100. It's a unique bug chain, so they win the full $40,000 and 4 Master of Pwn points. #Pwn2Own#P2OAustin
Confirmed! The Synacktiv team used a heap overflow to take over the #Canon ImageCLASS MF644Cdw printer. In doing so, they win $20,000 and 2 Master of Pwn points. #Pwn2Own#P2OAustin
The full schedule for #Pwn2Own Austin is now live! We had to deconflict many attempts and work around some logistical challenges, but we aren't complaining about 58 entries. See the schedule at zerodayinitiative.com/blog/2021/11/1… and watch the attempts live on YouTube and Twitch.
Registration for #Pwn2Own Austin is closed, and it's going to be our biggest ever with more than 55 entries. We'll be paying full price for all unique exploit chains. It's going to be an amazing contest full of exploits and intrigue. #P2OAustin#HaveFun
1 Followers 174 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/fy8W8yaJjQ
46 Followers 1K FollowingI live alone now and enjoy business, traveling, shopping, food and music. I have a calm personality and I hope we can be friends.
288 Followers 537 FollowingWe're better together. Resilience Cloud is a global community of risk/resilience industry service providers. 20 specialties under one roof. No more silos.
3K Followers 2K FollowingFishing, hiking, photography, music, & cigars.
Principal Consultant @RedSiege so I can pay for my hobbies. @hardwaterhacker.bsky.social
26K Followers 1K FollowingSenior Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
9K Followers 20 FollowingA Singapore company that discovers vulnerabilities to help customers mitigate the risks of cyber attacks. Organisers of @offbyoneconf
23K Followers 74 FollowingONCD’s mission is to advance national security, economic prosperity, and technological innovation through cybersecurity policy leadership.
21K Followers 278 FollowingI find and exploit 0day, develop OSes, hypervisors and emulators, design massively parallel data structures and code, and do precision machining! Optimization❤️
83K Followers 16 FollowingTrend Zero Day Initiative™ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
19K Followers 537 FollowingThreat Hunting & DFIR, Hacker, Geek, DEF CON & Black Hat CFP Review Board Member, DEF CON Contest/Events/Demo Labs Dept. Head, Black Hat Staff, DC801 Founder
145K Followers 215 FollowingWe are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit https://t.co/kxEbdfMny1.
8K Followers 151 FollowingFor contact in the security community. NOTE: All the tweets are totally my personal opinions, not about any of my current employer stuff.