Nicolas Zilio (@big5_sec) 's Twitter Profile
Nicolas Zilio

@big5_sec

Another guy trying to bring a little to infosec community. All tweets are my own.

ID: 866900929714556928

linkhttps://big5-sec.github.io/ calendar_today23-05-2017 06:17:42

715 Tweet

422 Followers

180 Following

Thomas Rinsma (@thomasrinsma) 's Twitter Profile Photo

Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF. codeanlabs.com/blog/research/…

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Our deep-dive, IOCs, and exploit for CVE-2023-34992, an unauth command injection as root, effecting #Fortinet #FortiSIEM appliances. horizon3.ai/attack-researc…

Nathan Blondel (@slowerzs) 's Twitter Profile Photo

I wrote a blogpost on injecting code into a PPL process on Windows 11, without abusing any vulnerable driver. blog.slowerzs.net/posts/pplsyste…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Last week, Microsoft released a patch for CVE-2024-26238, a Windows 10 LPE reported by Guillaume André. You can read the advisory here: synacktiv.com/advisories/win…

ENKI WhiteHat (@enki_official_x) 's Twitter Profile Photo

Our research team wrote an article with a detailed analysis of Safari RCE (CVE-2023-37450). Check it out! medium.com/@enki-techblog…… #safari #rce #cve202337450 #enki #whitehat

Connor McGarr (@33y0re) 's Twitter Profile Photo

Recently I was writing up a blog about Secure Kernel and NT working together to initialize Kernel CFG. I realized there were a lot of concepts in SK I was unfamiliar with. Because of this I wrote a post on one of those topics - Secure Image Objects. Enjoy! connormcgarr.github.io/secure-images/

Mykola Grymalyuk (@khronokernel) 's Twitter Profile Photo

A second blog less than a week after? Well guess so! This time with CVE-2024-27822: macOS PackageKit Privilege Escalation though ZSH env files: khronokernel.com/macos/2024/06/…

James Forshaw (@tiraniddo) 's Twitter Profile Photo

Just because you get access denied accessing a folder, it doesn't mean you can't get access. A quick look at bypassing the security on the WindowsApps folder. tiraniddo.dev/2024/06/workin…

Ezrak1e (@ezrak1e) 's Twitter Profile Photo

A funny story about a vulnerability I found last year. It was fixed in February this year, probably CVE-2024-21371. The interesting point is that I discovered it and completed the exploit based on a piece of source code disclosed in the high-quality documentation report of msrc🤣

A funny story about a vulnerability I found last year.
It was fixed in February this year, probably CVE-2024-21371.
The interesting point is that I discovered it and completed the exploit based on a piece of source code disclosed in the high-quality documentation report of msrc🤣
Artem I. Baranov 🐦 (@artem_i_baranov) 's Twitter Profile Photo

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…

Curious what Windows Internals tricks rootkits have leveraged throughout their history to achieve the necessary goals of concealing malicious activities, I've published a pdf with a breakdown of these tricks. It covers the following rootkit families. artemonsecurity.blogspot.com/2024/06/window…
Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Our latest post by one of our recent team additions, Luke Harding, revisits CVE-2023-48788 - a SQL injection for #Fortinet #FortiClient EMS. He details exploitation obstacles and payload crafting between the two mainline versions of the software. horizon3.ai/attack-researc…

0patch (@0patch) 's Twitter Profile Photo

As Microsoft is deprecating NTLM, we know many organizations can't just stop using this protocol. We have security patches that block exploitation of known NTLM-related vulnerabilities such as PetitPotam, PrinterBug and DFSCoerce; more are in the works. techcommunity.microsoft.com/t5/windows-ser…

Piotr Bazydło (@chudypb) 's Twitter Profile Photo

My OffensiveCon 2024 talk about Exchange PowerShell Remoting is available. Includes a chain of 3 vulns to RCE (file write + file read + DLL load). youtu.be/AxNO2iA2fAg?si…

fidgeting bits (@fidgetingbits) 's Twitter Profile Photo

Just published some notes about porting a redis exploit to work on the musl mallocng heap: research.nccgroup.com/2024/06/11/pum…

Ruikai (@retr0reg) 's Twitter Profile Photo

This is a blog about how I exploited Tenda Ac8's 0day remote overflow into RCE via mipsel ROPing with multi-regs. It includes experience that I learn from 2 weeks of gdb-multiarch-ing, mipsrop-ing, QEMU-ing, IDA-ing, ifconfig-ing from scratch to CVE. 0reg.dev/blog/tenda-ac8…