reversebrain
@reversebrain
Penetration Tester | Red Team Operator | Incident Response Operator | CTF player with @mhackeroni
ID: 519763783
https://reversebrain.github.io 09-03-2012 19:45:45
595 Tweet
2,2K Takipรงi
588 Takip Edilen
This new book has finally arrived. Thank's to No Starch Press as well as Bill Pollock -- [email protected] for making it happen as well as Lee Holmes as my tech reviewer.
The most sophisticated exploit we've ever seen. Thank you to Will Dormann is on Mastodon for bringing this to our attention. This is basically Stuxnet. 2.0
JULIAN ASSANGE IS FREE Julian Assange is free. He left Belmarsh maximum security prison on the morning of 24 June, after having spent 1901 days there. He was granted bail by the High Court in London and was released at Stansted airport during the afternoon, where he boarded a
I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed Faulting inst: mov r9d, [r8] R8: unmapped address ...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address John Hammond
Some of you may already be aware but due to extenuating circumstances we've made an early award! The 2024 Pwnie for Epic Fail goes to CrowdStrike for the CRWD2K bug! ๐ฆ
And that's it for this year DEF CON #CTF: your favorite Italian team got 6th place after 3 intense days of !sleeping. Thanks to the organizers Nautilus Institute and all the amazing teams that competed with us in this backdoor-sharing event! See you next year! โฅ๏ธ #defcon #defcon32
New writeup from ๊ ษฟษฦษษq๊ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia