brice berna (@__brendel) 's Twitter Profile
brice berna

@__brendel

ID: 545129770

calendar_today04-04-2012 13:31:40

409 Tweet

249 Takipçi

246 Takip Edilen

Maurice Heumann (@momo5502) 's Twitter Profile Photo

I spent the last 5 months reverse engineering Denuvo's protection in Hogwarts Legacy and finally managed to bypass it using more than 2000 hooks 😂 One of the toughest challenges of my life. Here's my blog post about it: momo5502.com/posts/2024-03-…

Charles Fol (@cfreal_) 's Twitter Profile Photo

The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very stable code execution exploit from a file read primitive. #cnext

David Louapre (@dlouapre) 's Twitter Profile Photo

Nouvelle vidéo ! LE SYSTÈME ELO. Comment fonctionne cette méthode de notation très connue aux échecs, mais également utilisée dans le foot, l’e-sport et ... sur Tinder ! youtu.be/9oRDksmH0zM

Nouvelle vidéo ! LE SYSTÈME ELO. Comment fonctionne cette méthode de notation très connue aux échecs, mais également utilisée dans le foot, l’e-sport et ... sur Tinder !
youtu.be/9oRDksmH0zM
Qualys (@qualys) 's Twitter Profile Photo

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…

Charles Fol (@cfreal_) 's Twitter Profile Photo

Blind file read to RCE in PHP - without access to files, we need to build reliable arbitrary read primitive from the ISO-2022-CN-EXT overflow (CVE-2024-2961) #CNEXT

quarkslab (@quarkslab) 's Twitter Profile Photo

Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices. Did you miss the "Attacking the Samsung Galaxy A* Boot Chain" talk by Maxime Rossi Bellom and Raphaël Neveu earlier this year ? Talk && PoC || GTFO: blog.quarkslab.com/attacking-the-…

Finding and chaining 4 vulns to exfiltrate encryption keys from the Android Keystore on Samsung series A* devices.
Did you miss the  "Attacking the Samsung Galaxy A* Boot Chain" talk by <a href="/max_r_b/">Maxime Rossi Bellom</a> and Raphaël Neveu earlier this year ? 
Talk &amp;&amp; PoC  || GTFO:
blog.quarkslab.com/attacking-the-…
Charles Fol (@cfreal_) 's Twitter Profile Photo

LIGHTYEAR: - Can dump large files, even through a GET parameter - Retrieves characters using dichotomy - Does not cause PHP warnings

David Louapre (@dlouapre) 's Twitter Profile Photo

Nouveau billet ! LE CHAMP ÉLECTROMAGNÉTIQUE EXISTE-T-IL ? On discute électromagnétisme, causalité et facteurs de confusion, et on se demande si l'on peut se passer complètement des champs électriques et magnétiques scienceetonnante.substack.com/p/le-champ-ele…

Charles Fol (@cfreal_) 's Twitter Profile Photo

This year again, I am lucky enough to get nominated twice for the Top Ten Hacking Techniques, for my research on iconv and PHP, and lightyear. This time feels a bit special however, as these are my last blog posts on Ambionics Security. ambionics.io/blog/iconv-cve… ambionics.io/blog/lightyear…

Dimitri Fourny (@dimitrifourny) 's Twitter Profile Photo

I finally publishing my League of Legends mod from 2020, designed to bypass the anti-cheat system: github.com/DimitriFourny/…

Synacktiv (@synacktiv) 's Twitter Profile Photo

In iOS 18.4, Apple introduced a bug in dynamic symbol resolutions for some specific exports. F4b took a long journey down a rabbit hole to understand its root cause. synacktiv.com/en/publication…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent blog post on reverse engineering the Valve Anti-Cheat (VAC) solution codeneverdies.github.io/posts/gh-2/ #infosec #reverseengineering

Excellent blog post on reverse engineering the Valve Anti-Cheat (VAC) solution

codeneverdies.github.io/posts/gh-2/

#infosec #reverseengineering
Charles Fol (@cfreal_) 's Twitter Profile Photo

lightyear just got 6 times faster! Although I now work at Synacktiv, I proposed a PR for the tool to support threading and compression, greatly reducing the time required to dump a file. Dumping the demo /etc/passwd now takes 48s instead of 5m30. github.com/ambionics/ligh…