Traxes (@lod108) 's Twitter Profile
Traxes

@lod108

ID: 904719734

calendar_today25-10-2012 21:36:25

168 Tweet

155 Followers

332 Following

⏢Ben Gardiner (he/him) (@benlgardiner) 's Twitter Profile Photo

ozzie_offsec @ayomawdb Here's the section that details the RSA partial key exposure from my writeup on the xmas.rip challenge. gist.github.com/BenGardiner/03… Thank you Niklaus Schiess and Traxes for all the fun!

Niklaus Schiess (@_takeshix) 's Twitter Profile Photo

Kudos to ⏢Ben Gardiner (he/him) for solving all 24 xmas.rip ports first! 🥳 Christmas presents have been sent out. He also published a writeup with solutions for all 24 ports and the voucher challenges, you should check it out! gist.github.com/BenGardiner/03… #advent

Niklaus Schiess (@_takeshix) 's Twitter Profile Photo

And here is the repository with all the code and configs for the Advent Calendar of Advanced Cyber Fun 2018: github.com/takeshixx/adve… Thanks everyone for participating! #advent #Docker #fun

Traxes (@lod108) 's Twitter Profile Photo

Loving the Write-ups from ⏢Ben Gardiner (he/him) gist.github.com/BenGardiner/03… and mindfuckup emanuelduss.ch/2018/12/advent… Booth Write-ups show exactly what we wanted to achieve :) Some minimal coding and learning weird Stuff. Was definitely worth it. Thanks to everyone Playing. Merry XMAS2018 ;-)

Niklaus Schiess (@_takeshix) 's Twitter Profile Photo

North Korea's latest tablet PC "Ryongaksan" is very similiar to Woolim. It is using the same hardware/software base with slight and more hardening. Interesting to see how their hardening and development process evolves. #DPRK

North Korea's latest tablet PC "Ryongaksan" is very similiar to Woolim. It is using the same hardware/software base with slight and more hardening. Interesting to see how their hardening and development process evolves. #DPRK
Dimitrios Slamaris (@dim0x69) 's Twitter Profile Photo

Great Talk by Traxes on "Architecture-independent vulnerability discovery" using his framework: github.com/Traxes/zeno #tr19 Based on binary ninja

Alex “neat” A. (@neatmonster_) 's Twitter Profile Photo

Best talk of #TR19 for me was Traxes's automatic vulnerability discovery tool. He demo'ed it on a trustlet from TZ training, so cool! github.com/Traxes/zeno

Sourcetrail (@sourcetrail) 's Twitter Profile Photo

Sourcetrail is now free and open-source! 🥳 The source code is available on GitHub: github.com/CoatiSoftware/… If this catches you by surprise, read our blog post on why we made this change and how we will continue: sourcetrail.com/blog/open_sour…

Sourcetrail is now free and open-source! 🥳
The source code is available on GitHub: github.com/CoatiSoftware/…
If this catches you by surprise, read our blog post on why we made this change and how we will continue: sourcetrail.com/blog/open_sour…
Niklas B (@_niklasb) 's Twitter Profile Photo

Calle Svensson pwn.py, then wondering why I can’t import pwntools, then mv pwn.py solve.py, then one more minute of wondering why the hell I still cannot import pwntools, then rm pwn.pyc Repeat next CTF

Csaba Fitzl (@theevilbit) 's Twitter Profile Photo

In the last (5th) part of my XPC exploitation series I detail PID reuse attacks, why they are possible and how to solve them. The case study is again F-Secure SAFE. There are some recommended conference talks on the subject at the end. theevilbit.github.io/posts/secure_c…

Insinuator (@insinuator) 's Twitter Profile Photo

New blog post: Forklift <=3.3.9 and <=3.4 Local Privilege Escalations on macOS (CVE-2020-15349/CVE-2020-27192) insinuator.net/2020/11/forkli…

Traxes (@lod108) 's Twitter Profile Photo

We investigated and found the error. It was connected to a not found tty of the dtls server. Which crashed when accepting connections. Due to dtls it started to send parts of the handshake. Basically docker -it worked but on -d it crashed. Fixed it -dt 😅. Sorry! Running again

Traxes (@lod108) 's Twitter Profile Photo

Found a nice Memory corruption during serialization/deserialization in a soft-TPM used by Hypervisors access.redhat.com/security/cve/c… 🥳