Seb (@0xseb__) 's Twitter Profile
Seb

@0xseb__

Independent security researcher

ID: 465409539

calendar_today16-01-2012 09:43:16

254 Tweet

259 Followers

1,1K Following

Bruno (@bkth_) 's Twitter Profile Photo

I wrote a thing about a Chakra RCE for which the JIT trigger is tweetable :) function opt(o) { o.pwn = o.a; } phoenhex.re/2019-07-10/ten…

VideoLAN (@videolan) 's Twitter Profile Photo

About the "security issue" on #VLC : VLC is not vulnerable. tl;dr: the issue is in a 3rd party library, called libebml, which was fixed more than 16 months ago. VLC since version 3.0.3 has the correct version shipped, and MITRE did not even check their claim. Thread:

Tavis Ormandy (@taviso) 's Twitter Profile Photo

I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation. googleprojectzero.blogspot.com/2019/08/down-r…

Rolf Rolles (@rolfrolles) 's Twitter Profile Photo

ねば Hope it helps! Hopefully you've also seen Takahiro Haruyama extensions to the code (blog carbonblack.com/2019/02/25/def…, code github.com/carbonblack/He…)

David Crawshaw (@davidcrawshaw) 's Twitter Profile Photo

JSON originally had comments. They were removed. (This was explained on Google+. Then Google removed the explanation. Luckily archive.org saved it.)

JSON originally had comments. They were removed. (This was explained on Google+. Then Google removed the explanation. Luckily archive.org saved it.)
Matt Miller (@epakskape) 's Twitter Profile Photo

Good PE parsing finds by j00ru//vx that were fixed this month One of the issues he found was a bug that I introduced when refactoring code for RFG :( Takeaway: devs who know how to write secure code are still prone to make mistakes (if the lang lets them) bugs.chromium.org/p/project-zero…

Igor Skochinsky (@IgorSkochinsky@infosec.exchange) (@igorskochinsky) 's Twitter Profile Photo

A random bit of trivia I remembered recently. Got a DOS box with a password protected BIOS and no tools handy? Corrupt CMOS checksum with this simple command and get inside after reboot: echo “dummy” > CLOCK$

R136a1 (@theenergystory) 's Twitter Profile Photo

Archive of kernelmode.info is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

After a lot of work and some crypto-related delays, I couldn't be more proud to publish Alex Ionescu's and mine latest research - The complete overview of CET internals on Windows (so far!): windows-internals.com/cet-on-windows/

Alex Ionescu (@aionescu) 's Twitter Profile Photo

svchost.exe is so passé, I hope Metasploit and CobaltStrike are ready to migrate into oemsvchost.exe. Is your EDR/EPP/NGAV/Cloud Blockchain Enclave Regex Engine ready for Windows 10X?

svchost.exe is so passé, I hope Metasploit and CobaltStrike are ready to migrate into oemsvchost.exe. Is your EDR/EPP/NGAV/Cloud Blockchain Enclave Regex Engine ready for Windows 10X?
ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

Since @zoho typically ignores researchers, I figured it was OK to share a ManageEngine Desktop Central zero-day exploit with everyone. UnCVE'ed, unpatched and unauthenticated RCE as SYSTEM/root. Enjoy! Advisory: srcincite.io/advisories/src… Exploit: srcincite.io/pocs/src-2020-…

Gil Dabah (@_arkon) 's Twitter Profile Photo

Guys & girls! Exactly a year ago I promised over 15 bugs in win32k. You're welcome to read and find out about my biggest research so far: #win32k #SmashTheRef bug class - github.com/gdabah/win32k-… Check out the paper and the POCs, there are some crazy stuff going on. Promise!

Alex Ionescu (@aionescu) 's Twitter Profile Photo

Well, I complained about signed drivers the other day, but a Microsoft partner *cheating on their test* to get WHQL certification (and getting a nice EV cert with it) takes the icing on the cake. And the 15 these IOCTLs. Because as Joxean Koret (@[email protected]) said, there’s never any bugs in AV 🤦🏻‍♂️

Well, I complained about signed drivers the other day, but a <a href="/Microsoft/">Microsoft</a> partner *cheating on their test* to get WHQL certification (and getting a nice EV cert with it) takes the icing on the cake. And the 15 these IOCTLs. Because as <a href="/matalaz/">Joxean Koret (@joxean@mastodon.social)</a> said, there’s never any bugs in AV 🤦🏻‍♂️
Alex Ionescu (@aionescu) 's Twitter Profile Photo

Well I was gone for a month so apologies if this old news but, Windows 21H1 is adding: * Authenticated Pointers (PAC) on ARM64 (🥳!!!) * Dynamic relocations to allow user shared data to be relocated (omg!!!) * Kernel Mode TLS (Thread Local Storage) with PsTls* APIs * Kernel CET

Visual C++ (@visualc) 's Twitter Profile Photo

AddressSanitizer for MSVC is no longer experimental. Check out this runtime analysis tool to find and fix memory bugs in your code: devblogs.microsoft.com/cppblog/addres…

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

Happy Solstice! Time to celebrate Truth and Justice. I appreciate your support; and I want to let you try one of my value-packed & expensive commercial masterclasses: ☀️ Masterclass: Hacking Fuzzers for Smarter Bughunting (on-demand video) zerodayengineering.com/training/maste… This class