Code White GmbH

@codewhitesec

Red Teaming. Security Research. Penetration Testing. Threat Intelligence.

Ulm, Mannheim & Los Angeles
Unit: juliol de 2014

Tuits

Has blocat @codewhitesec

Estàs segur que vols veure aquests tuits? Això no desblocarà @codewhitesec.

  1. 7 d’oct.

    PIC your Katz! Say hello to HandleKatz, our position independent Lsass dumper abusing cloned handles, direct system calls and a modified version of minidumpwritedump() brought to you by

    Desfés
  2. 21 de set.

    Getting RCE with a Razor! Our walk-through of CVE-2021-22941 affecting Citrix ShareFile Storage Zones Controller by is now live

    Desfés
  3. 20 de set.
    Desfés
  4. 14 de set.

    . published a security bulletin regarding a pre-auth RCE in Storage Zones Controller (CVE-2021-22941) found by : Details will follow on our blog at

    Desfés
  5. 11 de juny

    How the search for deser bugs in sent down a rabbit hole where he winded up stumbling upon a completely unrelated unauth'ed admin access -2021-21481

    Desfés
  6. 1 de juny

    Happy to announce that our talk 'PIC Your Malware' was accepted ! and will share their experiences on leveraging fully position independent code to avoid suspicious memory artifacts & other useful techniques to stay under the radar of EDRs & BlueTeams 😎

    Desfés
  7. 9 de març

    Unauth'd admin access to ? Our very own has you covered, see -2021-21481 and SAP Security Note 3022422. Better patch than sorry. Our customers got their heads-up already and we'll publish a detailed blog post when appropriate.

    Desfés
  8. 28 de jul. de 2020

    Beware: we found that MS Lync/Skype for Business is also vulnerable to CVE-2020-1147; endpoint requires auth'd user with SIP enabled

    Desfés
  9. 14 de jul. de 2020

    Once upon a time there was a XG Firewall N-day that had and dig deep until they got RCE, a 0-day and a comprehensive blog post. -2020-12271 -2020-15504

    Desfés
  10. 20 de març de 2020

    For your reading pleasure: Liferay Portal unauth'd RCE vulns affecting all versions from 6.1 to 7.2, found by our very own

    Desfés
  11. 2 de març de 2020

    We're giving away 6 tickets for students! First come, first serve: just DM us

    Desfés
  12. 29 de gen. de 2020

    We're excited to support and its great cause taking place near our office at the

    Desfés
  13. 17 de gen. de 2020

    Rumble in the pipe - a nice writeup about a vuln in by our teammate

    Desfés
  14. 15 de nov. de 2019

    There is a special Friday after-work tradition at Code White - today powered by a very nice RCE-Redwine sponsored by . We appreciate! Thx ;)

    Desfés
  15. 2 de set. de 2019

    We are proud to announce the new Code White office location in Mannheim downtown. Lets have a great start over there guys!

    Desfés
  16. 1 d’ag. de 2019

    Struggling to exploit H2 DB? This may help: we found a new way utilizing native libraries and JNI. Kudos to

    Desfés
  17. 19 de jul. de 2019

    Let's break the dAM-SIng - a heap-based AMSI bypass for VBA. Follow of into the rabbit hole in our latest blog post:

    Desfés
  18. 2 de jul. de 2019

    Critical vulns in reversed & exploited by our colleagues and - patch your asap and see the talk of and for details (tnx guys for the teaser that got us started)

    Desfés
  19. 7 de febr. de 2019

    It is always good to take a 2nd look at existing vulns. So found a new rock-solid exploitation technique for the Telerik UI framework (hint: affects an Avast product ;) Enjoy: -2017-11317

    Desfés
  20. 6 de jul. de 2018

    Toys for red teams! Headache for blue teams? LethalHTA - a new lateral movement technique brought to you by and @marpie0 of Code White. Check out our new blog post at

    Desfés

Sembla que triga molt a carregar-se.

És possible que el Twitter hagi assolit el límit de capacitat o que experimenti una sobrecàrrega momentània. Torna-ho a provar o vés a l'estat del Twitter si en vols obtenir més informació.

    També et pot interessar

    ·