-
- #iot
- #chrome-and-friends: Chrome, V8, Blink, Mojo, etc.
- Linux kernel #todo
- expdev #todo
- fuzzing #todo
| @inproceedings{avgerinos_aeg:_2011, | |
| title = {{AEG}: {Automatic} {Exploit} {Generation}}, | |
| booktitle = {Network and {Distributed} {System} {Security} {Symposium}}, | |
| author = {Avgerinos, Thanassis and Cha, Sang Kil and Hao, Brent Lim Tze and Brumley, David}, | |
| month = feb, | |
| year = {2011}, | |
| keywords = {MyPHDThesis} | |
| } | |
| @inproceedings{brumley_automatic_2008, |
| Mute these words in your settings here: https://twitter.com/settings/muted_keywords | |
| ActivityTweet | |
| generic_activity_highlights | |
| generic_activity_momentsbreaking | |
| RankedOrganicTweet | |
| suggest_activity | |
| suggest_activity_feed | |
| suggest_activity_highlights | |
| suggest_activity_tweet |
| #include <stdlib.h> | |
| #include <stdio.h> | |
| #include <stdint.h> | |
| int | |
| main(void) { | |
| int ii; | |
| uint8_t buf[8192] = { 0 }; | |
| // Worlds most impressive exploit |
| #!/usr/bin/env bash | |
| # Credit: https://twitter.com/_fel1x | |
| # poc: https://twitter.com/_fel1x/status/1151487051986087936 | |
| # Adapted to GKE/kube-proxy by: https://twitter.com/bradgeesaman | |
| # and to avoid detection by Falco's default rules | |
| read -r -d '' ESCAPE <<'EOF' | |
| #!/bin/sh |
| { | |
| "mode": "patterns", | |
| "proxySettings": [ | |
| { | |
| "address": "127.0.0.1", | |
| "port": 8080, | |
| "username": "", | |
| "password": "", | |
| "type": 1, | |
| "title": "127.0.0.1:8080", |
| #!/bin/bash | |
| set -euo pipefail | |
| GNUPGHOME=$(mktemp -d) | |
| cleanup() { | |
| echo rm -rf "$GNUPGHOME" | |
| killall gpg-agent || : | |
| } |
| // gets uid 0 (iOS 11) | |
| // add patchfinder and you should be good | |
| // Abraham Masri @cheesecakeufo | |
| /* | |
| * Purpose: iterates over the procs and finds our proc | |
| */ | |
| uint64_t get_our_proc() { |
In order of first appearance in The Morning Paper.
| apiVersion: extensions/v1beta1 | |
| kind: PodSecurityPolicy | |
| metadata: | |
| name: restricted | |
| annotations: | |
| seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' | |
| apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' | |
| seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' | |
| apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' | |
| spec: |