Jack Ullrich

53 posts

Jack Ullrich

Jack Ullrich

@winternl_t

Programming & Research @SpecterOps

Katılım Eylül 2020
255 Takip Edilen1.6K Takipçiler
Michael B.
Michael B.@DownWithUpSec·
AWStrace: Another Windows Strace attempt by me. Using a named pipe and shellcode inside the remote process, send registers back and pretty print the output.
Michael B. tweet media
English
2
7
37
3.1K
Jack Ullrich retweetledi
SpecterOps
SpecterOps@SpecterOps·
The Azure AD Broker plays a key role in Entra ID sign-in & token handling, but how well do we really understand it? @winternl_t unpacks its on-disk cache, how to decode it, & the security implications. 🔐 ghst.ly/4oTR4v5
English
1
34
104
9.9K
Jack Ullrich retweetledi
dreadnode
dreadnode@dreadnode·
Can we eliminate the C2 server entirely and create truly autonomous malware? On the Dreadnode blog, Principal Security Researcher @0xdab0 details how we developed an entirely local, C2-less malware that can autonomously discover and exploit one type of privilege escalation vulnerability. A future where fully autonomous red team assessments are powered by nothing more than a pre-installed local model and a Lua interpreter may be closer than you’d imagine. Read about it here: dreadnode.io/blog/lolmil-li…
dreadnode tweet media
English
9
103
345
87.3K
Jack Ullrich retweetledi
Check Point Research
Check Point Research@_CPResearch_·
Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: 💥 .URL file exploitation (assigned CVE-2025-33053) 🧰 Custom Mythic implants, LOLBins, and custom payloads 🌍 High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-f…
English
0
107
263
43.6K
Jack Ullrich retweetledi
Joseph Cox
Joseph Cox@josephfcox·
Here is my recent DEF CON talk on Anom, the encrypted phone secretly ran by the FBI. All about the phone, the network, how Anom was structured, who used it, what this means for Signal, Telegram, more youtube.com/watch?v=uFyk5U…
YouTube video
YouTube
English
7
126
462
44.2K
vx-underground
vx-underground@vxunderground·
Today Kaspersky issued a goodbye letter to it's American customers. We are going to miss Kaspersky. Kaspersky was always a solid AV product and the research they conducted was always excellent.
vx-underground tweet media
English
79
316
3.1K
270.5K
Jack Ullrich
Jack Ullrich@winternl_t·
@timmisiak I wonder if @AirbusSecLab has done anything related to this. Qantas Flight 72, involving an A330, likely involved a random bit flip
English
0
0
1
201
Tim Misiak
Tim Misiak@timmisiak·
I just thought of an experiment I want to try... if a program memory starts getting flipped bits at random, what is the expected number/percent of bits flipped before the program crashes?
English
3
0
7
1.8K
Jack Ullrich retweetledi
Sy Brand
Sy Brand@TartanLlama·
I wrote a massive blog post containing many of the things the C++ team at Microsoft worked on last year, please read it for my gratification, thanks devblogs.microsoft.com/cppblog/a-year…
English
11
71
362
34.3K
chompie
chompie@chompie1337·
Rootkits, keyloggers, and DKOM (oh my!). The video is finally up for @FuzzySec and I’s BlackHat talk: Close encounters of the advanced persistent kind: Leveraging rootkits for post-exploitation. Check it out ☺️ youtu.be/t7Rx3crobZU?si…
YouTube video
YouTube
English
3
114
297
40.5K
Jack Ullrich
Jack Ullrich@winternl_t·
@rainer_grimm Thank you for sharing your story. Your mentorship programs and blog are invaluable resources. Keep going.
English
0
0
0
57