mimicatz (@0xclient) 's Twitter Profile
mimicatz

@0xclient

🐫 | silent observer

ID: 1547354366566453249

calendar_today13-07-2022 22:57:35

3,3K Tweet

4,4K Takipçi

424 Takip Edilen

mimicatz (@0xclient) 's Twitter Profile Photo

I hope to get discipline for reading it, because this year i have a skillissue managing my time and finishing things that i had started :)

I hope to get discipline for reading it, because this year i have a skillissue managing my time and finishing things that i had started :)
LaurieWired (@lauriewired) 's Twitter Profile Photo

Ring 0 is a highly-privileged state on CPUs. Negative Ring Levels have even *higher* privilege. You just haven’t heard of them. For X86, Ring -1 is Hardware Virtualization, Ring -2 is System Management Mode, Ring -3 is Intel ME / AMD PSP. Arm get's even weirder:

Ring 0 is a highly-privileged state on CPUs.

Negative Ring Levels have even *higher* privilege. You just haven’t heard of them.

For X86, Ring -1 is Hardware Virtualization, Ring -2 is System Management Mode, Ring -3 is Intel ME / AMD PSP.

Arm get's even weirder:
Zero Day Engineering (@zerodaytraining) 's Twitter Profile Photo

New class: Hypervisor Field Updates 2021-2025 In this series of four lectures Alisa Esage Шевченко looks into recent virtualization technology developments across hardware, exploit competitions, emergent attacks and fuzzing research. Details and purchase here: zerodayengineering.com/training/maste…

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Our latest post details how we exploited Retbleed (a CPU vulnerability) to compromise a machine from a sandboxed process and VM! Curious? 👇 bughunters.google.com/blog/624373010…

eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aimed at people that newer touched drivers before and covers IOCTL codes, IRPs and some IDA shenanigans with unions. eversinc33.com/posts/driver-r… Enjoy :3

As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aimed at people that newer touched drivers before and covers IOCTL codes, IRPs and some IDA shenanigans with unions.

eversinc33.com/posts/driver-r…

Enjoy :3
Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Please join me on the next Off By One Security stream with guest Eugene Lim (spaceraccoon | Eugene Lim ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT youtube.com/watch?v=dMt2qy…

Please join me on the next <a href="/offby1security/">Off By One Security</a> stream with guest Eugene Lim (<a href="/spaceraccoonsec/">spaceraccoon | Eugene Lim</a> ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT

youtube.com/watch?v=dMt2qy…
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (Dylan Goods) and Duncan Ogilvie (Duncan Ogilvie 🍍). Source: secret.club/2022/08/29/boo… #redteam #maldev #malwaredevelopment

Implementing a custom bootkit for Windows Sandbox exploration.

An excellent post by Dylan Goods (<a href="/sdoogm/">Dylan Goods</a>) and Duncan Ogilvie (<a href="/mrexodia/">Duncan Ogilvie 🍍</a>).

Source: secret.club/2022/08/29/boo…

#redteam #maldev #malwaredevelopment
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

DebugPrivilege (@debugprivilege) 's Twitter Profile Photo

New blog post: Laptop froze on hibernate, because an Intel driver bailed during power transition and left a power IRP hanging. This can be an interesting one for those that are interested in how I maneuver through a crash dump and how I think, etc. medium.com/@Debugger/hibe…

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

For anyone interested in the technique that EasyAntiCheat.sys uses to hide pages in memory, you can read about it here: 0avx.github.io/posts/easyanti…

mimicatz (@0xclient) 's Twitter Profile Photo

one of the reasons i don’t play CTF is that I hate when I try to solve a reverse engineering challenges for fun and I find that 98% of the challenge is a cryptography :) like why ? I will go spend more time reversing some “real” shit and find real bugs lol