CiarΓ‘n McNally · @ciaranmak
272 followers · 1239 posts · Server mastodon.ie

OpenBSD sounding the death cry of generic memory exploitation openbsd.org/papers/csw2023.pdf

#infosec #exploitdev

Last updated 2 years ago

Ringzer0 · @ringzer0
165 followers · 215 posts · Server infosec.exchange

πŸ“’ Don’t forget to sign up for one of our advanced hands-on trainings! The first week of is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn , , , , & more. Don't miss out!

ringzer0.training/

#infosec #RETURN23XPLOIT #diffing #exploitdev #arm64 #reverseengineering #idapro #cybersecurity #training

Last updated 3 years ago

hexnomad · @hexnomad
70 followers · 40 posts · Server infosec.exchange

Binder VMA bug from projectzero just unrestricted: bugs.chromium.org/p/project-ze
CVE-2023-20928

#binder #android #vulndev #exploitdev

Last updated 3 years ago

Ringzer0 · @ringzer0
162 followers · 199 posts · Server infosec.exchange

Level up your skills with ! Our trainings offer hands-on instruction from top industry experts. In week 1, learn , , , , & more. Don't miss out!

ringzer0.training/

#cybersecurity #RETURN23XPLOIT #diffing #exploitdev #arm64 #reverseengineering #idapro #infosec #training

Last updated 3 years ago

Jesse Spangenberger · @azuleonyx
140 followers · 473 posts · Server infosec.exchange

RT @binaryz0ne@twitter.com

Important note to those new to this account. The course below is completely FREE. I know someone (maybe more) has ripped the videos & probably now the labs & is selling them on @udemy@twitter.com. Please do not pay for this course, it is FREE!
exploitation.ashemery.com/

πŸ¦πŸ”—: twitter.com/binaryz0ne/status/

#exploitdev #offsec

Last updated 3 years ago

Ali Hadi | B!n@ry · @dfir
460 followers · 61 posts · Server infosec.exchange

Just finished uploading the final set of labs that are published publicly. That's all folks for now. Hope they will be useful to someone out there!...

exploitation.ashemery.com

#re #offsec #exploitdev #softwareexploitation

Last updated 3 years ago

Rairii · @Rairii
1430 followers · 676 posts · Server haqueers.com

I don't think I posted one here yet, so:

I'm into - I've done application/bootloader/embedded / but also know my way around and and :)

I like (keep copying those floppies and dumping all the rare media!)

I like but haven't really played anything that much recently. Historically I've enjoyed (I have a wood carving of blaziken on my wall!) - I prefer using console because I prefer to work on my PC and big games take up so much disk space these days! (Not to mention I've heard about lots of invasive anti-cheat that flags just having typical reversing tools open!)

I don't like cats, I prefer :)

I like watching sports sometimes - association , , mainly.

#introduction #introductions #infosec #reverseengineering #reversing #appsec #websec #exploitdev #SoftwarePreservation #gameing #gaming #pokemon #mario #metroid #halo #fifa #dogs #football #Tennis #snooker

Last updated 3 years ago

eldstal · @albin
8 followers · 39 posts · Server kolektiva.social

I've got a style question for all of the and people out there.

When you write ROP chains, how do you arrange your code? How do you document it, and how do you make sure you can still understand it later?

I've landed on something like the attached example, where I build a stack out of named integer constants. The names are chosen based on the gadgets they represent. I then write high-level comments to try to encode the purpose of each gadget.

This is easy enough for simple linear code, but gets messy for a stack that needs to change at runtime.

What clever tricks have you come up with to make your ROP spaghetti more readable?

#infosec #ctf #documentation #exploitdev

Last updated 3 years ago

· @postmodern
350 followers · 240 posts · Server infosec.exchange

Does anyone have an example of an exploit that sends multiple HTTP requests to two different hosts? Has that edge-case ever occurred or does every HTTP based exploit target a single host?

#exploitdev

Last updated 3 years ago

ark · @ark
80 followers · 94 posts · Server defcon.social
Quentin Minster · @laomaiweng
11 followers · 67 posts · Server infosec.exchange

Ok so now with the ASCII art banner & rick roll I guess that means my proof-of-concept exploit is complete. πŸ‘‰πŸ‘ˆπŸ₯Ί

#exploitdev

Last updated 3 years ago

· @postmodern
346 followers · 221 posts · Server infosec.exchange

How should XSS exploits be printed out?

#xss #poll #websecurity #exploits #exploitdev

Last updated 3 years ago

hashford · @hashford
103 followers · 263 posts · Server infosec.exchange

What tools and services do people use when and doing research on ? Not touched on this at all yet and while i have found some python libs for crafting specific MIME headers im wondering if there is anything more advanced/mature/refined than me rolling it all myself?

Also, taking recommendations for services for testing, socketlab or mailgun look good and have pretty fleshed out APIs, any others?

#bughunting #exploitdev #email #smtp

Last updated 3 years ago

Quentin Minster · @laomaiweng
12 followers · 78 posts · Server infosec.exchange
· @postmodern
280 followers · 150 posts · Server infosec.exchange

Dumb Question, and I'm sure it's been asked before, but is there a repo somewhere of trivially exploitable *nix binaries for testing/demo purposes? Preferably with Makefiles that disable all of the fancy mitigations.

#appsec #exploitation #exploitdev #binaries

Last updated 3 years ago

Bjoern Kerler · @revskills
273 followers · 166 posts · Server infosec.exchange

RT @ke_0z@twitter.com

First post in a very long while , and
, an ARM exploit dev challenge/write up using IDA PRO, GDB and Qiling (@qiling_io@twitter.com)

0z.ke/arm-qiling-ctf/

πŸ¦πŸ”—: twitter.com/ke_0z/status/15921

#qiling #ctf #arm #exploitdev #reverseengineering

Last updated 3 years ago

hashford · @hashford
103 followers · 263 posts · Server infosec.exchange

In the spirit of moving away from the hellbird site and embracing other platforms, what servers do the crowd enjoy? and ones specifically, although i am sceptical one exists that i would enjoy being a part of - iv joined a few before that descended into all sorts of /chan nonsense quite quickly, sadly.

#discord #infosec #malware #exploitdev

Last updated 3 years ago

Andrew Kramer · @rewzilla
40 followers · 35 posts · Server infosec.exchange

Apparently posts are a thing here.

Hello! My name is Andrew. Originally from the Pacific northwest, but now reside in the midwest. I am a college professor, teaching classes in , , , and .

I love playing . I have two dogs. If you have any dogs, please feel free to send me pictures of them.

Be excellent to each other. ✌️

#introduction #cprogramming #assembly #reverseengineering #exploitdev #chess

Last updated 3 years ago

sk3w :verified: :unverified: · @sk3w
53 followers · 45 posts · Server infosec.exchange

I've enjoyed writing proxy tools in so much, I decided to try my hand at this RC4-MD4 downgrade from @tiraniddo Now just need to decrypt the session key...

#rustlang #redteam #offsec #exploitdev

Last updated 3 years ago

Rairii :windows: · @Rairii
-1 followers · 650 posts · Server infosec.exchange

Given that in my absense, the instance where my old infosec-adjacent account was has shut down, let's go for this one.

I am also @slipstream - which will remain for personal stuff (although haven't logged in in years). Would log in and update it but m.s appears to be getting hammered right now!

I'm into at heart (malware, applications, bare-metal, embedded, I've done it all at some point).

Also into . Found quite a few bugs in the Windows bootloaders.

I know my way around appsec/websec, and the typical cryptography related issues. (Even found a fakesigning bug in the Windows Boot Manager, thankfully that never made its way to an actual RTM build!)

My favourite bug class is fakesigning, although I haven't done any cryptocurrency smart contract research (not sure if I ever will, even though that appears to be where the massive bug bounties are right now...)

#introduction #introductions #reverseengineering #exploitdev

Last updated 3 years ago