0x_alibabas's profile picture.

Alibabas

@0x_alibabas

Reported a Local Privilege Escalation (LPE) vuln that was fixed by the CPU-Z developers. My name was mentioned in the official CPU-Z release notes: cpuid.com/softwares/cpu-…

0x_alibabas's tweet image. Reported a Local Privilege Escalation (LPE) vuln that was fixed by the CPU-Z developers.

My name was mentioned in the official CPU-Z release notes:
cpuid.com/softwares/cpu-…

Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94). 🫡 yeswehack.com/hunters/0x-ali… #YesWeRHackers

0x_alibabas's tweet image. Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94).
🫡 yeswehack.com/hunters/0x-ali… #YesWeRHackers

Alibabas 님이 재게시함

#redteam Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe Github: 2x7EQ13/WSASS Experimental version: Windows 11 24H2 #Blueteam

TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
TwoSevenOneT's tweet image. #redteam 
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam

Alibabas 님이 재게시함

🚨 CALL 4 PAPERS — Bug Bounty Village @ H2HC 2025 🚨 Caçou um bug insano? Tem case real ou técnica nova? Esse é seu palco! Envie sua proposta pelo form: bit.ly/4n4hXf9 #H2HC #BugBountyVillage #Call4Papers #HackerCulture

BugBountyBr's tweet image. 🚨 CALL 4 PAPERS — Bug Bounty Village @ H2HC 2025 🚨

Caçou um bug insano? Tem case real ou técnica nova? Esse é seu palco! 

Envie sua proposta pelo form:
bit.ly/4n4hXf9

#H2HC #BugBountyVillage #Call4Papers #HackerCulture

I've got an arbitrary file (not folder) delete bug on hand. Anyone know the latest privilege escalation techniques on Windows 24H2, since the changes around ::$INDEX_ALLOCATION?


Alibabas 님이 재게시함

🚀Exciting News! Introducing my latest work: Beyond XSS This series of articles aims to introduce front-end security topics, perfect for frontend devs and those intrigued by frontend security. Suitable for all skill levels from beginners to intermediates aszx87410.github.io/beyond-xss/en/


Alibabas 님이 재게시함

#oldnewthing Need something blue? Create the file "C:\Windows\System32\config\OSDATA" and restart Windows. You’ll get a permanent Blue Screen of Death( BSOD ). #pentester #redteam

TwoSevenOneT's tweet image. #oldnewthing
Need something blue? Create the file "C:\Windows\System32\config\OSDATA" and restart Windows. You’ll get a permanent Blue Screen of Death( BSOD ).
#pentester #redteam
TwoSevenOneT's tweet image. #oldnewthing
Need something blue? Create the file "C:\Windows\System32\config\OSDATA" and restart Windows. You’ll get a permanent Blue Screen of Death( BSOD ).
#pentester #redteam

Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94). #YesWeRHackers

0x_alibabas's tweet image. Just got a reward for a high vulnerability submitted on @yeswehack -- Code Injection (CWE-94). #YesWeRHackers

Alibabas 님이 재게시함

Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published. This vulnerability is still not patched. Here's the story:

Perhaps one of the most badass CVE's I've ever seen from @midwestneil 💪😤 cisa.gov/news-events/ic…



Alibabas 님이 재게시함

New blog post! It took me a few months to get motivated to write again, but here we are with a remarkable client-side chain I found with @xssdoctor vitorfalcao.com/posts/hacking-…


Alibabas 님이 재게시함

(A new class of symlink attacks is mentioned below.) According to Microsoft (MSRC), attacks involving symlinks stored on removable drives or in file system images (like VHDX) are not vulnerabilities. If an unprivileged user manages to quickly replace a regular file... 1/7

errno_fail's tweet image. (A new class of symlink attacks is mentioned below.)

According to Microsoft (MSRC), attacks involving symlinks stored on removable drives or in file system images (like VHDX) are not vulnerabilities.

If an unprivileged user manages to quickly replace a regular file... 1/7

Alibabas 님이 재게시함

I try an avoid this hellsite, but I did a quick dive into sudo in Windows and here are my initial findings. tiraniddo.dev/2024/02/sudo-o… The main take away is, writing Rust won't save you from logical bugs :)


United States 트렌드

Loading...

Something went wrong.


Something went wrong.