mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#windowsinternals

0 posts0 participants0 posts today
Alexandre Borges<p>(good reading) Introducing Early Cascade Injection: From Windows Process Creation to Stealthy Injection:</p><p><a href="https://www.outflank.nl/blog/2024/10/15/introducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">outflank.nl/blog/2024/10/15/in</span><span class="invisible">troducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/</span></a></p><p><a href="https://mastodon.social/tags/codeinject" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codeinject</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> <a href="https://mastodon.social/tags/cprogramming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cprogramming</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
pill.<p>Do anyone have recommendation to learn about <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> ?</p>
Graham Sutherland / Polynomial<p>I wrote a thing for work! Microsoft are introducing a new type confusion bug class mitigation called CastGuard, as part of the MSVC++ compiler.</p><p>Right now it's still undocumented &amp; unreleased. I stumbled across it by accident while looking at the Load Configuration directory in PE files, and ended up going down a deep rabbit hole of reverse engineering the entire feature and discovering all the hidden compiler flags and language keywords</p><p><a href="https://labs.nettitude.com/blog/preventing-type-confusion-with-castguard/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">labs.nettitude.com/blog/preven</span><span class="invisible">ting-type-confusion-with-castguard/</span></a></p><p><a href="https://chaos.social/tags/cpp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cpp</span></a> <a href="https://chaos.social/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> <a href="https://chaos.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Tedi Heriyanto<p>Windows API Function Cheatsheets: <a href="https://github.com/snowcra5h/windows-api-function-cheatsheets" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/snowcra5h/windows-a</span><span class="invisible">pi-function-cheatsheets</span></a></p><p><a href="https://infosec.exchange/tags/windowsapi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsapi</span></a> <a href="https://infosec.exchange/tags/cheatsheet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cheatsheet</span></a> <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
log4jm<p>Some of my holiday presents to start my 2023 <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/books" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>books</span></a> reading list:</p><p>1) "Tracers in the Dark" by <span class="h-card"><a href="https://infosec.exchange/@agreenberg" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>agreenberg</span></a></span> who along with <span class="h-card"><a href="https://infosec.exchange/@kimzetter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kimzetter</span></a></span> and <span class="h-card"><a href="https://infosec.exchange/@NicoleP" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>NicoleP</span></a></span> is in my top 3 favorite writers in cyber</p><p>2) "The Art of Attack" by Maxie Reynolds</p><p>3) "The Art of Cyberwarfare" by Jon DiMaggio</p><p>all sitting atop my laptop, which is filled with eBooks I've bought over the last year. On there my goals for 2023 is to start/finish:</p><p>4) <a href="https://infosec.exchange/tags/WindowsInternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WindowsInternals</span></a> 🤓</p><p>5) the incredible <span class="h-card"><a href="https://infosec.exchange/@alyssam_infosec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alyssam_infosec</span></a></span>'s "Cybersecurity Career Guide", which is actually where I'm going to start since I've got interviews for an InfoSec role in 2 weeks.</p><p>What are you reading in 2023? <a href="https://infosec.exchange/tags/HappyNewYear" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HappyNewYear</span></a></p>
nt!PopGetDope :coolcat:<p>:twitter:​ finally seems to be flat-lining, trying out this new mastodon thing...</p><p><a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a>, for peeps I've not met prior via my bird app handle <span class="h-card"><a href="https://infosec.exchange/@ntpopgetdope" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ntpopgetdope</span></a></span>. I'm a vulnerability researcher that's worked in the industry professionally for &gt;4yrs</p><p>My background stems from an obsession with <a href="https://infosec.exchange/tags/windowsinternals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windowsinternals</span></a> &amp; the vastly underrated 'HAL.dll'. These days I'm into baseband vuln research working on obscure hardware, architectures &amp; attacks. Love chatting about all things:<br><a href="https://infosec.exchange/tags/fpga" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fpga</span></a> <a href="https://infosec.exchange/tags/uefi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uefi</span></a> <a href="https://infosec.exchange/tags/baseband" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>baseband</span></a> <a href="https://infosec.exchange/tags/faultinjection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>faultinjection</span></a> <a href="https://infosec.exchange/tags/openhardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openhardware</span></a> <a href="https://infosec.exchange/tags/embeddedelectronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>embeddedelectronics</span></a> <a href="https://infosec.exchange/tags/pcbdesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcbdesign</span></a> and <a href="https://infosec.exchange/tags/cats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cats</span></a> !</p><p>Currently with the @InterruptLabs crew, a boutique vulnerability research &amp; exploit development firm in the UK.</p>