
Esmid
@xedi25
Reverse Engineering, Malware Analysis, Windows Internals, PE | Malware Researcher at @PaloAltoNtwks | Tweets are my own
ID: 1920447512
30-09-2013 15:34:49
879 Tweet
1,1K Takipçi
445 Takip Edilen









Today, Mandiant (part of Google Cloud), collaboratively with Google’s TAG, is releasing research on APT29’s increased pace of phishing activity against governments, foreign embassies, and other diplomatic entities in 2023. A few high-level takeaways below: 🧵 mandiant.com/resources/blog…







I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed Faulting inst: mov r9d, [r8] R8: unmapped address ...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address John Hammond
![Patrick Wardle (@patrickwardle) on Twitter photo I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed
Faulting inst: mov r9d, [r8]
R8: unmapped address
...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address
<a href="/_JohnHammond/">John Hammond</a> I don't do Windows but here are some (initial) details about why the CrowdStrike's CSAgent.sys crashed
Faulting inst: mov r9d, [r8]
R8: unmapped address
...taken from an array of pointers (held in RAX), index RDX (0x14 * 0x8) holds the invalid memory address
<a href="/_JohnHammond/">John Hammond</a>](https://pbs.twimg.com/media/GS3WnUHXMAA-XSa.png)


The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 blog.orange.tw/posts/2025-01-… cc: splitline 👁️🐈⬛

