Referenced link: https://blog.scrt.ch/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce/
Originally posted by thaddeus e. grugq 🌻 thegrugq@infosec.exchange / @thegrugq@twitter.com: https://twitter.com/0xdea/status/1638502907069825025#m
RT by @thegrugq: Another entertaining #BinDiff and #exploit development adventure
Producing a #PoC for CVE-2022-42475 (#Fortinet #RCE)
// by @plopz0r
https://blog.scrt.ch/2023/03/14/producing-a-poc-for-cve-2022-42475-fortinet-rce/
#BinDiff #exploit #poc #Fortinet #RCE
A while back, I made a thing that turns #BinDiff matches into YARA rules: https://github.com/google/vxsig #100DaysOfYARA
You know you are doing a good job when you are starting #bindiff for code similarities for your report.
"Let's justify this link between a couple of #malware variants".
#reverse #CTI #threathintel
#BinDiff #malware #reverse #cti #threathintel
Ghidra 9.2.3 is out and works with BinExport. https://github.com/google/binexport/releases/tag/v12-20210416-rc3 #BinDiff #Ghidra @GHIDRA_RE https://twitter.com/AdmVonSchneider/status/1383052868794642435