cyg07 أعاد

We were inspired by @notwhickey to scan #cobaltstrike beacons across the web. Here are some of our findings: quake.360.cn/quake/#/report… welcome to use our system,Click here to search:quake.360.cn/quake/#/search…

360CERT's tweet image. We were inspired by @notwhickey to scan #cobaltstrike beacons across the web.
Here are some of our findings: quake.360.cn/quake/#/report…
welcome to use our system,Click here to search:quake.360.cn/quake/#/search…

:) This one is very close, but It has too much hardcode.

digital-missiles/CVE-2019-0708-PoC-Hitting-Path has changed! github.com/digital-missil…



@cyg0x7 Hi, could you please share the slides of your DEFCON 26 "Building a Cryptographic Backdoor in OpenSSL" talk?



It's quite intersting, something distinct from the previous exploit methods.

[oss-security] CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures ift.tt/2PBxir9



Nice. @360CERT

The sample analysis of APT-C-27’s recent attack is just released! Let's take a look:) blog.360totalsecurity.com/en/the-sample-…



Quake is Quake, BRoyale is BRoyale.

Prove it :), @Quake isn't @FortniteGame . I get the hype, but please :/. I could make a bet for this one though :). Quake is Quake, BRoyale is BRoyale. It's not because you are very good in several BR games that you can be top at Starcraft. It's like sports. Gl though @Ninja

strenxie's tweet image. Prove it :), @Quake isn't @FortniteGame . I get the hype, but please :/. I could make a bet for this one though :). Quake is Quake, BRoyale is BRoyale. It's not because you are very good in several BR games that you can be top at Starcraft. It's like sports. Gl though @Ninja


Hacker's hot-temper is the primary productive force in information security industry. 黑客的暴脾气是信息安全行业的第一生产力。

It has been 10 years since we reverse engineered the MS08-67 patch and published the FIRST public vuln PoC (which was used by the Confiker Worm authors). BUT, it has only been about a year since we got an angry email blaming us for the Confiker worm. dontstuffbeansupyournose.com/2008/10/23/loo…

s7ephen's tweet image. It has been 10 years since we reverse engineered the MS08-67 patch and published the FIRST public vuln PoC  (which was used by the Confiker Worm authors). BUT, it has only been about a year since we got an angry email blaming us for the Confiker worm. dontstuffbeansupyournose.com/2008/10/23/loo…


cyg07 أعاد

writeup of CVE-2018-4242, UaF in AppleHV.


cyg07 أعاد

CVE-2018-1038: TotalMeltdown vulnerability Analysis translate.google.com/translate?sl=a…

360CERT's tweet image. CVE-2018-1038: TotalMeltdown vulnerability Analysis 

translate.google.com/translate?sl=a…

cyg07 أعاد

New blog post - UEFI Ninja! Walks through a bit of work I did on UEFI and how I used #BinaryNinja to find protocols defined elsewhere in a firmware image. lightbulbone.com/posts/2018/03/…


cyg07 أعاد

CVE-2017-16995: Ubuntu LPE vulnerability Analysis translate.google.com/translate?sl=a…

360CERT's tweet image. CVE-2017-16995: Ubuntu LPE vulnerability Analysis 

translate.google.com/translate?sl=a…

cyg07 أعاد

see u guys in #syscan360 expert panel tomorrow, we’ll discuss all of the interesting research with our colleagues from unicorn team & cyber immunity lab

rootredrain's tweet image. see u guys in #syscan360 expert panel tomorrow, we’ll discuss all of the interesting research with our colleagues from unicorn team & cyber immunity lab
rootredrain's tweet image. see u guys in #syscan360 expert panel tomorrow, we’ll discuss all of the interesting research with our colleagues from unicorn team & cyber immunity lab
rootredrain's tweet image. see u guys in #syscan360 expert panel tomorrow, we’ll discuss all of the interesting research with our colleagues from unicorn team & cyber immunity lab
rootredrain's tweet image. see u guys in #syscan360 expert panel tomorrow, we’ll discuss all of the interesting research with our colleagues from unicorn team & cyber immunity lab

。。。。。。。。。。。。。

流水的腾讯360, 铁打的Richard Zhu, 牛逼牛逼



cyg07 أعاد

My @offensive_con slides released! Include all 010 templates for Intel ACM and Boot Guard (KM + IBBM). All these details been REconstructed from AMI FW. Discovered few Intel Boot Guard bypasses: 2 SW + 1 HW. Never underestimate RE in your Threat Model!! github.com/REhints/Public…


cyg07 أعاد

We updated our Driver security guidance with a driver security checklist, which can help developers to eliminate known security flaws before their drivers are released ow.ly/PcT230idXW0


Loading...

Something went wrong.


Something went wrong.