A2nkF | Ilias

434 posts

A2nkF | Ilias banner
A2nkF | Ilias

A2nkF | Ilias

@A2nkF_

Breaking Apple things. CTF with @allesctf & @Sauercl0ud | 🖤

Zurich, Switzerland Katılım Haziran 2018
1.2K Takip Edilen2K Takipçiler
A2nkF | Ilias
A2nkF | Ilias@A2nkF_·
@LiveOverflow - What obj/struct fields are attacker controlled/can be tainted somehow (even if not arbitrarily controlled) - Object relationships & sane value range - Field access convention (eg field supposed to be retrieved via helper function, lock must be acquired before writing x etc)
English
0
0
1
399
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
When you audit code, what global assumptions/invariants do you keep in working memory? For example when you review a web app you see how authorization is implemented. Then you keep that knowledge in your mind while reviewing different endpoints. What else? 🧠 Brainstorm pls 👇
English
15
3
94
16.4K
Tommaso
Tommaso@cutesmilee__·
after almost 3 years, this is my last day at Dataflow, it’s been amazing to work with all the people there, I grew up a lot and can’t thank them enough for the opportunities they gave me but now a new adventure is about to start :-)
English
7
0
68
7.9K
Layle
Layle@layle_ctf·
can anyone recommend any places to eat in zurich? ideally near central station but completely fine if not
English
8
1
4
0
A2nkF | Ilias
A2nkF | Ilias@A2nkF_·
@qwertyoruiopz @osxreverser Haha wait till you hear that the JIT is basically 1:1 copied from the Linux kernel. But tbh, you can’t call whatever Solana uses BPF anymore.
English
0
0
1
0
A2nkF | Ilias
A2nkF | Ilias@A2nkF_·
@layle_ctf Oh wow it only took you like 5 seconds to get a 50% improvement in time until kernel connection 👀😜
English
1
0
1
0
Layle
Layle@layle_ctf·
I wrote a new guide for rapid kernel and driver debugging! This time with a 2x performance improvement :) We utilize VMware Workstation natively (no Vagrant) for some extra performance benefits. - Time until kernel connection: ~ 10 seconds - Time until driver break: ~ 35 seconds
English
2
14
82
0
Patrick Wardle
Patrick Wardle@patrickwardle·
Neat SIP bypass for macOS: 1️⃣ Apple-signed .pkgs triggers launch of (SIP entitled) system_installd 2️⃣ system_installd executes zsh shell 3️⃣ zsh executes any cmds found in (subvertabile) /etc/zshenv. Such cmds (executed as a child of system_installd), run uninhibited by SIP 🙌🏽
Microsoft Threat Intelligence@MsftSecIntel

Microsoft found a vulnerability (CVE-2021-30892) that could allow an attacker to bypass System Integrity Protection (SIP) in macOS. We shared our findings with Apple via coordinated vulnerability disclosure, and a fix was released October 26. Get details: msft.it/6016k1VFi

English
2
30
117
0
Layle
Layle@layle_ctf·
@A2nkF_ just seeing wild claims of "vulns" again
English
1
0
2
0
Layle
Layle@layle_ctf·
this guy is a clown lol
English
1
0
1
0
A2nkF | Ilias
A2nkF | Ilias@A2nkF_·
@theevilbit @s1guza 1080p WHATTTT??? What’s happening? Apple stopped doing Apple things and are giving us a ton of actually useful features
English
0
0
2
0
A2nkF | Ilias
A2nkF | Ilias@A2nkF_·
@gabe_k If they’d just give us a usable camera MAYBE PEOPLE WOULD USE IT
English
0
0
2
0