Worawit Wang

702 posts

Worawit Wang

Worawit Wang

@sleepya_

Thailand เข้าร่วม Ocak 2011
39 กำลังติดตาม1.9K ผู้ติดตาม
Worawit Wang รีทวีตแล้ว
ö
ö@r0keb·
Good morning! Just published a deep dive into PatchGuard internals: how it works, key internal functions, context init, and possible bypasses. r0keb.github.io/posts/PatchGua…
English
4
104
312
22.6K
Worawit Wang รีทวีตแล้ว
Yehuda Smirnov
Yehuda Smirnov@yudasm_·
What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…
English
6
76
222
13.8K
Worawit Wang รีทวีตแล้ว
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 blog.orange.tw/posts/2025-01-… cc: @_splitline_
Orange Tsai 🍊@orange_8361

Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍

English
4
205
532
75.1K
Worawit Wang รีทวีตแล้ว
Qualys
Qualys@qualys·
The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…
English
25
772
1.3K
524.5K
Worawit Wang รีทวีตแล้ว
MDSec
MDSec@MDSecLabs·
Exploiting CVE-2024-20656, a Local Privilege Escalation in the VSStandardCollectorService150 Service mdsec.co.uk/2024/01/cve-20… - new research from @filip_dragovic
MDSec tweet media
English
2
114
340
91.6K
Worawit Wang รีทวีตแล้ว
Boris Larin
Boris Larin@oct0xor·
We're revealing details of an obscure debugging feature in the Apple A12-A16 SoC’s that bypasses all of the hard-to-hack hardware-based memory protections on new iPhones. Its not used by the firmware and we don't know how the attackers found out about it. securelist.com/operation-tria…
English
25
243
918
315.1K
Worawit Wang รีทวีตแล้ว
Tavis Ormandy
Tavis Ormandy@taviso·
New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html
English
12
341
1.1K
412.9K
Worawit Wang
Worawit Wang@sleepya_·
@x1aoxia0xiao The error message means no formatting library. I only tested on Debian sid/trixie with default packages, g++ version is 13.2.0.
English
1
0
0
73
x1a0
x1a0@x1aoxia0xiao·
@sleepya_ I installed gcc13.1.0 and cmake15.x on ubuntu20.04 according to README.md, but when I run the py file, it will report that the format file cannot be found.
x1a0 tweet media
English
1
0
0
37
x1a0
x1a0@x1aoxia0xiao·
@sleepya_ Hello, can this tool be used for flutter applications version 2.19.6?
English
1
0
0
52
Worawit Wang รีทวีตแล้ว
Daniel Moghimi
Daniel Moghimi@flowyroll·
Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. downfall.page
GIF
English
16
375
951
228.9K
Worawit Wang รีทวีตแล้ว
Tavis Ormandy
Tavis Ormandy@taviso·
First big result from our new CPU research project, a use-after-free in AMD Zen2 processors! 🔥 AMD have just released updated microcode for affected systems, please update! lock.cmpxchg8b.com/zenbleed.html
GIF
English
34
653
1.8K
337.2K
Worawit Wang รีทวีตแล้ว
Andrei Scutariu
Andrei Scutariu@xnand_·
For anyone that has ran this PoC, consider your data stolen. This is what eventually runs on your host after a few stages. If you wanna analyse it, don't use a web browser or your IP will get blacklisted. #CVE_2023_35829 #backdoor
Andrei Scutariu tweet media
English
15
138
397
175K
Worawit Wang รีทวีตแล้ว
Mor Davidovich
Mor Davidovich@dec0ne·
Introducing DavRelayUp - A port of #KrbRelayUp with modifications to allow for NTLM relay from WebDAV to LDAP and abuse #RBCD in order achieve #LPE in domain-joined windows workstations where LDAP signing is not enforced. Demo in second tweet. github.com/Dec0ne/DavRela…
English
9
170
392
79.7K
Worawit Wang
Worawit Wang@sleepya_·
My approach to call a kernel function and process creation callback against Windows HVCI datafarm-cybersecurity.medium.com/code-execution…. In short, I modified page table of SSDT. Then, change the jump target to another kernel function. For the callback, I used procmon driver functions and SEH.
English
2
78
183
30K
Worawit Wang รีทวีตแล้ว
Oliver Lyak
Oliver Lyak@ly4k_·
Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard. These techniques also work on victims logged on before the server was compromised. research.ifcr.dk/pass-the-chall…
English
34
679
1.7K
215.5K