stdnoerr

57 posts

stdnoerr

stdnoerr

@stdnoerr

Tech enthusiast | pwner | CTFs with @ARESxCyber

Area 51 加入时间 Haziran 2020
212 关注220 粉丝
stdnoerr
stdnoerr@stdnoerr·
I will be in Riyadh for the BlackHat MEA CTF finals. If you're there as well, ping me. I would like to chat with CTFers, or anyone interested in cybersecurity, in person. Exchanging ideas is always fun
English
0
0
1
142
Synacktiv
Synacktiv@Synacktiv·
In our new article, Maxime Desbrus examines a technique for easily creating a Rust “Two-Face” binary for #Linux: ➡️ in most environments it runs a benign program; ➡️ but on a specific host it launches an entirely different, much more discreet payload. Read it here 🔗 synacktiv.com/en/publication…
English
1
17
61
5.7K
stdnoerr
stdnoerr@stdnoerr·
@0x_shaq Yeah man. You have left CTFs for a while but those were the days. Full on action. I actually liked a lot of your tweets since you OS dev brainfuck journey lol Lets catch up sometime
English
1
0
1
131
faulty *ptrrr
faulty *ptrrr@0x_shaq·
@stdnoerr long time no see stdnoerr :) seeing you here brings back old memories from the discord server lmao
English
1
0
0
173
h0mbre
h0mbre@h0mbre_·
what is the standard for calling a bug 0click-RCE when it's something you don't have a PoC for and don't even know if it requires more bugs? you can just say it's RCE bc it does memory corruption?
English
5
1
59
10.1K
stdnoerr
stdnoerr@stdnoerr·
played BlackHat 2024 Qualifiers with AirOverflow. Didn't get much time but managed to solve one challenge. Here's the writeup for the one I solved. P.S. I'm in Riyadh for the Finals. If you're there as well, feel free to hit me up stdnoerr.github.io/writeup/2023/1… #BHMEA24
English
0
0
3
320
stdnoerr
stdnoerr@stdnoerr·
Finally figured out my approach and I'm already thinking of a new, hopefully better, one.
English
0
0
0
142
stdnoerr
stdnoerr@stdnoerr·
Today I opened the poc I was trying to write and I couldn't understand what I was trying to attempt🫠, got rusty on Netfilter internals and never documented the manual steps of debugging (was using ftrace to tame race condition). Lesson learnt: ALWAYS document and take notes 2/2
English
1
0
3
227
stdnoerr
stdnoerr@stdnoerr·
I was trying to write an exploit for CVE-2023-32233 last summer. It was my first exposure to the netfilter subsystem and race conditions. Had to give up when university started. I thought I would continue to try in my free time. Never did. 1/2
English
2
0
2
502
stdnoerr
stdnoerr@stdnoerr·
@_h0p5 That's so cool!!! Well deserved
English
0
0
0
216
Physics In History
Physics In History@PhysInHistory·
Richard Feynman was a brilliant physicist best known for his exceptional contributions to quantum mechanics and his captivating teaching style, among others. Here are all of Feynman's Freely available Lectures at one place. A Thread 🧵
Physics In History tweet media
English
87
2.6K
9.6K
1.6M
Mike Felch (Stay Ready)
Mike Felch (Stay Ready)@ustayready·
A quick method to bypass an EDR. Even aggressive EDR's can be bypassed. Allocate your shellcode, overwrite a WNF subscription callback in a userland process, and trigger the WNF state change.. Old but relevant example github.com/ustayready/wnf… follow for more fun soon to come!
English
8
198
656
0
stdnoerr
stdnoerr@stdnoerr·
@mistymntncop I need to read it again ig. Sorry if It turns out to be nothing
English
1
0
0
0
j j
j j@mistymntncop·
@stdnoerr Thanks! I had a skim. I feel like those DOM UAF still need JS though ?
English
1
0
0
0
j j
j j@mistymntncop·
Wonder if there's ever been a browser exploit that doesn't involve javascript? That'd be a scary thing...
English
4
0
3
0
stdnoerr
stdnoerr@stdnoerr·
@mistymntncop I found the document. It is about JSC and I may or may not remember the exact contents I mentioned above since I read this document some time ago (~8-9 months). But the gist is same. And yeah it is utterly fascinating iokit.racing/jsctales.pdf
English
1
0
1
0
j j
j j@mistymntncop·
@stdnoerr Wow! Hope you can find a link. That sounds fascinating.
English
1
0
0
0