kost
11.9K posts

kost
@k0st
Security/Hack. FLOSS security software contributor.
Katılım Mayıs 2008
3.1K Takip Edilen1.7K Takipçiler
kost retweetledi
kost retweetledi

See you at @BalCC0n !
BalCCon@BalCC0n
#BalCCon2k25-Against the current is just around the corner on 19| 20| 21 September 2025!You don’t want to miss: @travisgoodspeed @MalwareUtkonos @gannimo @herrmann1001 @joegrand @GMahovlic @Th3PeKo @micko_mame @k0st …Secure your spot now at : 2k25.balccon.org/tickets/ #BalCCon
English
kost retweetledi

GitHub - cisagov/decider: A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework. github.com/cisagov/decider
English
kost retweetledi

The entire 3rd-edition of @rossjanderson's "Security Engineering" is available free as PDFs now!
cl.cam.ac.uk/archive/rja14/…
English
kost retweetledi

A great write-up on Linux process name stomping techniques from @haxrob
h/t @thoughtb0x
doubleagent.net/process-name-s…
English
kost retweetledi
kost retweetledi

PoC Exploit Released for 0-day Windows Kernel
of Privilege Vulnerability (CVE-2024-21338) : github.com/Nero22k/Exploi…
github.com/hakaioffsec/CV…
Details : hakaisecurity.io/cve-2024-21338…

English

@vladimircicovic @GMahovlic @ivanmarkovicsec Pogledaj Davida / h1kari, on je radio čuda, a lokalno ti je @KatjaPericin imala projekt jako davno oko fpga i kriptoanalize (za jtr mislim). gpu je nekako u zadnje vrijeme uzeo primat za tu namjenu...
kost retweetledi

I’m happy to share that I’m starting a new position as Global Head of X-Force Red @IBM! I'm excited to lead X-Force Red onto the next phase of our journey, incorporating tradecraft from and lessons learned building one of the world's top red teams; X-Force Adversary Services.
Thank you to @angus_tx for getting us to where we are today and best of luck on your next adventures!
English
kost retweetledi
kost retweetledi

Bluetooth vulnerabilities in Android, Linux, macOS, iOS and Windows can be exploited to pair an emulated bluetooth keyboard and inject keystrokes without user confirmation : github.com/skysafe/reblog… credits @marcnewlin
Slides : github.com/marcnewlin/hi_…
CVE's :
CVE-2024-0230
CVE-2023-45866
CVE-2024-21306

English
kost retweetledi

New blog post is out! Extracting the SecOC keys used for securing the CAN Bus on the 2021+ RAV4 Prime. icanhack.nl/blog/secoc-key…
Research started all the way in 2022, but took many evenings of reverse engineering to get code execution.
PoC: github.com/I-CAN-hack/sec…

English
kost retweetledi

Researchers create AI worms that can spread from one system to another : github.com/StavC/ComPromp…
ComPromptMized : Unleashing Zero-click Worms that Target GenAI-Powered Applications : github.com/StavC/ComPromp…
Paper : drive.google.com/file/d/1pYUm6X… credits @ben_nassi
English

@jduck Covered all in presentation, but in short: CPU with Intel CET/AMD Shadow stack support, Linux kernel 6.6+, glibc 2.39+, ELF binary compiled with x86 feature: SHSTK (all 64 bit!). Yep, it needs recompilation, but some distros (like Ubuntu) already correctly compiled some binaries.
English

@k0st Any further details? Doesn't this require specific hardware and recompiling everything?
English

Presented Shadow Stack in Linux userland backed up with Intel CET. Finally, full stack (hardware, kernel, glibc, gcc) is now available!
Help Net Security@helpnetsecurity
Here’s @k0st discussing Linux improvements in memory corruption based protections at @bsideszagreb #bsides #bsideszagreb @Divertosecurity @SrceHr
English
kost retweetledi








