sigabrt (@sigabrt9) 's Twitter Profile
sigabrt

@sigabrt9

ID: 1013847422882275330

calendar_today02-07-2018 18:10:36

73 Tweet

132 Followers

369 Following

Kalmarunionen (@kalmarunionendm) 's Twitter Profile Photo

Our writeup showing the 0-day we used to escape the linux kvmtools hypervisor to solve the hxp CTF challange indie_vmm! kalmarunionen.dk/writeups/2021/… by alexander krog Viktor Edström N00byEdge

Almond OffSec (@almondoffsec) 's Twitter Profile Photo

SAERXCIT implemented some recent AD attacks into LDAP relays - for hardened environments where usual techniques are not working, and wrote about why and when to use them: offsec.almond.consulting/ldap-relays-fo…

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing the final post of a 3 part series on “modern” browser exploitation targeting Windows. In this post we port our exploit primitives to Edge itself & combine 12 ROP chains in order to defeat ACG, CIG, DEP, ASLR, CFG, "no child processes" connormcgarr.github.io/type-confusion…

Andrey Konovalov (@andreyknvl) 's Twitter Profile Photo

Wrote an article about #fuzzing the Linux kernel network stack externally with #syzkaller. The article covers: 🧰 Introduction to syzkaller 💉 Using TUN/TAP for packet injection 👽 Integrating TUN/TAP via pseudo-syscalls 🏆 Showcases of found bugs xairy.io/articles/syzka…

Almond OffSec (@almondoffsec) 's Twitter Profile Photo

No PKINIT? No problem! Thanks to team members Yannick and drm, you now have a way to (ab)use your ill-earned ADCS certificates even when domain controllers do not support PKINIT offsec.almond.consulting/authenticating…

No PKINIT? No problem! Thanks to team members Yannick and <a href="/lowercase_drm/">drm</a>, you now have a way to (ab)use your ill-earned ADCS certificates even when domain controllers do not support PKINIT
offsec.almond.consulting/authenticating…
434B (@0xricksanchez) 's Twitter Profile Photo

Linux kernel adventures continue. Here's part 2 "Learning Linux kernel exploitation". Took me way longer than expected to work through all the details... How many layers of indirection do one need? The answer is all of them! 0x434b.dev/learning-linux…

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Celebrating #Pwn2Own 2022 week (Trend Zero Day Initiative) with a long-overdue writeup of how we successfully exploited a wild (unbounded) memcpy for a guest-to-host virtualization breakout of Parallels at last year's competition: blog.ret2.io/2022/05/19/pwn…

Fletcher Davis (@gymr4t) 's Twitter Profile Photo

Protocol handlers are such an under-researched area. I don’t think people realize how many custom applications create protocol handlers on installation

chompie (@chompie1337) 's Twitter Profile Photo

Curious about exploiting VMs or memory bugs in a safe language? Read my new blog post, where I attack Firecracker, AWS' VMM written in Rust. Learn about the various layers of virtualization + the attack surface, and how design decisions impact security. graplsecurity.com/post/attacking…

Almond OffSec (@almondoffsec) 's Twitter Profile Photo

Ghostscript RCE CVE-2023-28879 can impact many applications processing images and PDF files. Discovery and exploitation write-up by team member sigabrt : offsec.almond.consulting/ghostscript-cv…

KevinLu (@k3vinlusec) 's Twitter Profile Photo

My new blog “Smash PostScript Interpreters Using a Syntax-Aware Fuzzer” zscaler.com/blogs/security…, the findings include 3 vulnerabilities in Acrobat Distiller and 1 vulnerability in Apple’s PSNormalizer. It’s inspired from ⁦ ϻг_ϻε 's ⁩ previous Postscript research.

Laluka@OffenSkill (@thelaluka) 's Twitter Profile Photo

Heyo ! 🧙‍♂️ Prochain stream Mardi 6 Juin à 21h en compagnie de sigabrt (et peut être voydstack ? 🧐) ! 🔥 Au programme : - Shell in the Ghost | Polishing the CVE-2023-28879 - Google DistroLess 101 | PoC with GoLang & AutoHeal See you soon ! 😎🛠️ twitch.tv/thelaluka

Heyo ! 🧙‍♂️

Prochain stream Mardi 6 Juin à 21h en compagnie de 
<a href="/sigabrt9/">sigabrt</a> (et peut être <a href="/voydstack/">voydstack</a> ? 🧐) ! 🔥

Au programme :
- Shell in the Ghost | Polishing the CVE-2023-28879
- Google DistroLess 101 | PoC with GoLang &amp; AutoHeal

See you soon ! 😎🛠️
twitch.tv/thelaluka
Almond OffSec (@almondoffsec) 's Twitter Profile Photo

Understanding the different types of LDAP authentication methods is fundamental to apprehend subjects such as relay attacks or countermeasures. This post by drm introduces them through the lens of Python libraries. offsec.almond.consulting/ldap-authentic…

Understanding the different types of LDAP authentication methods is fundamental to apprehend subjects such as relay attacks or countermeasures. This post by <a href="/lowercase_drm/">drm</a> introduces them through the lens of Python libraries.

offsec.almond.consulting/ldap-authentic…
Almond OffSec (@almondoffsec) 's Twitter Profile Photo

Got root, what now? Practical post-exploitation steps on an F5 Big-IP appliance, by team members drm and myst404 offsec.almond.consulting/post-exploitin…

Got root, what now? Practical post-exploitation steps on an F5 Big-IP appliance, by team members <a href="/lowercase_drm/">drm</a> and <a href="/myst404_/">myst404</a> 

offsec.almond.consulting/post-exploitin…
Almond OffSec (@almondoffsec) 's Twitter Profile Photo

Team member sigabrt describes a fuzzing methodology he used to find a heap overflow in a public YesWeHack ⠵ bug bounty program for Gnome: offsec.almond.consulting/using-aflplusp…

Team member <a href="/sigabrt9/">sigabrt</a> describes a fuzzing methodology he used to find a heap overflow in a public <a href="/yeswehack/">YesWeHack ⠵</a> bug bounty program for Gnome: offsec.almond.consulting/using-aflplusp…