Sreelakshmi Panangatt
@srlkhmi
ID: 3239592486
https://sreelakshmip.wordpress.com 08-06-2015 08:21:30
432 Tweet
243 Followers
633 Following
Static Taint Analysis using Binary Ninja: A Case Study of MySQL Cluster Vulnerabilities: renorobert provides copious details on using #BinaryNinja to discover lots of bugs in #MySQL Cluster, and he provides source code so you can, too. zerodayinitiative.com/blog/2022/2/14…
In his final blog on finding bugs using taint analysis, renorobert experiments with #CodeQL’s IR and #Clang checkers for detecting untrusted pointer derefs & tainted loop conditions. These techniques led to multiple vuln discoveries. Read the details at zerodayinitiative.com/blog/2022/2/22…
Here are the slides from the "Security Analysis of MTE Through Examples" talk I presented at BlueHat IL :) I hope you will like it and find it interesting! github.com/saaramar/secur…
ZDI Researcher renorobert looks at the patch gap between the #VMware ESXi TCP/IP stack and the #FreeBSD kernel it was based on. Some bugs went unpatched for years. Read the details at: zerodayinitiative.com/blog/2022/7/25…
In our latest #MindShaRE blog, renorobert talks about using Binary Ninja's stack data flow feature to look for uninitialized memory disclosure in BSD kernels. Read all the details (incl sample scripts) at zerodayinitiative.com/blog/2022/9/19…
VM escapes in #Parallels Desktop are a common target for many researchers. renorobert details some local privilege escalation via setuid root binaries in his latest blog. His write-up includes root cause analysis of CVE-2023-27322, -27324, & -27325. zerodayinitiative.com/blog/2023/4/5/…
CVE-2022-31696: renorobert takes an in-depth look at this #VMware #ESXi type confusion privilege escalation he discovered. He shows his research methodology and looks at the patch released to fix it. zerodayinitiative.com/blog/2023/6/21…
A little teaser of what's to come in 𝐈𝐬𝐬𝐮𝐞 𝟑! 'Deceptive Python Decompilation' by Calle Svensson 'Leaking Guest Physical Address Using Intel Extended Page Table Translation' by renorobert 'The Quest of malloc(0)' by red5heep
In our latest MindShaRE blog, renorobert describes how to use Binary Ninja’s MLIL to establish a data flow graph by tracing interactions between a specific memory allocation in order to find UAF bugs. He includes source code so you can, too. zerodayinitiative.com/blog/2025/3/20…