November 13, 2024
November 13, 2024
Uploaded my slides from POC2024. I'll soon be giving a slightly shorter version of the same talk on CODE BLUE 2024 too.https://t.co/ZnWJXYC7LD https://t.co/H2hYrceA1V
โ Xion (@0x10n) November 12, 2024
talks/poc2024 at main ยท leesh3288/talks ยท GitHub
Repo for talk slides & materials. Contribute to leesh3288/talks development by creating an account on GitHub.
Backdoor attempt on @exolabs through an innocent looking PR.
โ Alex Cheema - e/acc (@alexocheema) November 12, 2024
Read every line of code. Stay safu. pic.twitter.com/M0WHoCF5Mu
https://samy.pl/poisontap/
๐จNam3L3ss wants you to know the following pic.twitter.com/2v0AEHZXLg
โ Dark Web Informer (@DarkWebInformer) November 11, 2024
The entire 3rd-edition of @rossjanderson's "Security Engineering" is available free as PDFs now!https://t.co/4Mjd9TOzUp
โ Dino A. Dai Zovi (@dinodaizovi) November 12, 2024
love this ubuntu desktop LPE chain by @PsychoMario, reminds me quite a bit of his chromeOS chains :) https://t.co/IUYVoxv2mf
โ blasty (@bl4sty) November 12, 2024
Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis"
โ Zerotistic (@gegrgtezrze) November 12, 2024
I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things !
Might make it a talk...? ๐https://t.co/iWoP9GeZhX
Citrix RCE en EoP overview
โ ๐ณ (@sekurlsa_pw) November 12, 2024
Blog post:https://t.co/VFaw2w2FkF
PoC:https://t.co/GG3p6PKpuM
Citrix support article:https://t.co/bWEippuH8V
Credits:@watchtowrcyber @SinSinology https://t.co/uKpCwL8Dry pic.twitter.com/nwWQGxfbjW
Breaking Control Flow Flattening: A Deep Technical Analysis | Zerotistic's blog
Control flow flattening (CFF) is an interesting form of code obfuscation. While most obfuscation techniques focus on making individual operations hard to understand, CFF goes for something more ambitious - it tries to hide the entire flow of program execution (or, at a minimum, a functionโs). Today, I want to dig deep into a Binary Ninja plugin Iโve been building that automatically defeats this obfuscation. Not just what it does, but why it works and the mathematical foundations that make it pos...
Microsoft patched one of my bugs today. I found this shortly after reading blogpost https://t.co/znMv8LpFr2 by @KeyZ3r0 ๐ pic.twitter.com/7apYQDBQrf
โ chiefpie (@cplearns2h4ck) November 12, 2024
Rooting an Android POS "Smart Terminal" to steal credit card information:โ
โ Denis Laskov ๐ฎ๐ฑ (@it4sec) November 12, 2024
Paper "Exploring and Exploiting an Android 'Smart POS' Payment Terminal", by Jacopo Jannone.Paying with a POS will never feel the same for me.
PDF: https://t.co/mZqbgoZZyh
Video: https://t.co/V98uJ4MH0m pic.twitter.com/JsszytldAr
New from 404 Media: got hundreds of internal Secret Service emails where it said tracking peoples' location without a warrant was okay because citizens have clicked 'accept' on app terms of service. This is the data that powers tools like Locate X https://t.co/kwvFo1eNom
โ Joseph Cox (@josephfcox) November 12, 2024
New APT marketing dropped https://t.co/WSfgbxin2f
โ Greg Linares (Laughing Mantis) (@Laughing_Mantis) November 12, 2024