
João Domingos
@_r0ny
r0ny.net
Security Researcher
ID: 787975579039571968
17-10-2016 11:16:32
650 Tweet
87 Takipçi
177 Takip Edilen





No More Speculation: Exploiting CPU Side-Channels for Real by akrasuski1 bughunters.google.com/blog/471217009…



Many have asked about the process of doing security research. Mostly it's a lot of troubleshooting and getting bullied online. Join me for my new blog post which details the process of exploring an attack surface, finding 0day, and exploit dev. PoC inside securityintelligence.com/posts/critical…



connormcgarr.github.io/hvci/ Amazing how people found my preferred chapter (9) super-useful... Happy to read these articles Connor McGarr !!!




Excellent LPE write-up by @[email protected] , where he details how suspected compiler changes lead to the introduction of double fetch vulnerabilities. Also discusses a KASLR side channel bypass. PoCs included. Definitely check it out exploits.forsale/24h2-nt-exploi…


I recently developed and posted about a technique called "First sequence sync", expanding James Kettle's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…


Full exploit chain for the FiberGateway GR241AG home router r0ny.net/FiberGateway-G… Credits João Domingos #infosec #embedded
