
reversebrain
@reversebrain
Penetration Tester | Red Team Operator | Incident Response Operator | CTF player with @mhackeroni
ID: 519763783
https://reversebrain.github.io 09-03-2012 19:45:45
595 Tweet
2,2K Followers
588 Following


This new book has finally arrived. Thank's to No Starch Press as well as Bill Pollock -- [email protected] for making it happen as well as Lee Holmes as my tech reviewer.



The most sophisticated exploit we've ever seen. Thank you to Will Dormann is on Mastodon for bringing this to our attention. This is basically Stuxnet. 2.0




JULIAN ASSANGE IS FREE Julian Assange is free. He left Belmarsh maximum security prison on the morning of 24 June, after having spent 1901 days there. He was granted bail by the High Court in London and was released at Stansted airport during the afternoon, where he boarded a




I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed Faulting inst: mov r9d, [r8] R8: unmapped address ...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address John Hammond
![Patrick Wardle (@patrickwardle) on Twitter photo I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed
Faulting inst: mov r9d, [r8]
R8: unmapped address
...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address
<a href="/_JohnHammond/">John Hammond</a> I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed
Faulting inst: mov r9d, [r8]
R8: unmapped address
...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address
<a href="/_JohnHammond/">John Hammond</a>](https://pbs.twimg.com/media/GS3WnUHXMAA-XSa.png)


Some of you may already be aware but due to extenuating circumstances we've made an early award! The 2024 Pwnie for Epic Fail goes to CrowdStrike for the CRWD2K bug! 🦃







