GraplSec Profile Banner
Grapl Inc. Profile
Grapl Inc.

@GraplSec

Followers
2K
Following
283
Media
4
Statuses
77

Official account for Grapl - the open source graph based #DetectionAndResponse platform. https://t.co/UVB0OSesNo…

San Francisco, CA
Joined November 2019
Don't wanna be here? Send us removal request.
@m_ou_se
Mara
3 years
🦀📕 All chapters of my book, Rust Atomics and Locks, are now freely available online: https://t.co/EgEhl3pSLO Enjoy! ✨
62
633
3K
@CloudSecList
CloudSecList
3 years
📖 CloudSecList Issue 154 just got released, w/ content from @falco_org @lyfteng @istiomesh @raesene @GraplSec @LightspinTech and more!
Tweet card summary image
cloudseclist.com
Issue 154 of CloudSecList
1
5
19
@0xdabbad00
Scott Piper
3 years
Great write-up by @chompie1337 into trying to exploit Firecracker and luckily it withstood the attempt. It's really impressive how much @GraplSec audits the security of the components they rely on, and appreciated they post even investigations like this that didn't find 0-day.
@GraplSec
Grapl Inc.
3 years
Firecracker is a microVM manager in #Rust that powers #AWS services like Lambda and Fargate. It's also one of the key components of Grapl's multi-tenant isolation. A critical dependency deserves some red teaming - here's how we attacked AWS' Firecracker. https://t.co/axWZ7jX7jp
1
7
42
@GraplSec
Grapl Inc.
3 years
Firecracker is a microVM manager in #Rust that powers #AWS services like Lambda and Fargate. It's also one of the key components of Grapl's multi-tenant isolation. A critical dependency deserves some red teaming - here's how we attacked AWS' Firecracker. https://t.co/axWZ7jX7jp
0
10
48
@GraplSec
Grapl Inc.
4 years
Using code to describe your infrastructure unlocks a lot of expressive power, which is why we use @PulumiCorp to automate our deployments. When we couldn't find providers for some of the services we use, we ended up making some. Learn how:
0
8
23
@buildkite
Buildkite
4 years
You can now manage Buildkite-as-code using @PulumiCorp 🔥 🙌 and 💚 to @GraplSec for sharing it with the world. You can get started with it here:
pulumi.com
Provides an overview of the Buildkite Provider for Pulumi.
@PulumiCorp
Pulumi
4 years
ICYMI: at #PulumiUP we announced that we now have over 100 integrations including new additions from @OracleCloud, @databricks, @eventstore, @checklyHQ, @buildkite, @jfrog Artifactory, @elastic Cloud, @TwingateHQ, @Scaleway, @Tailscale and @SlackHQ: https://t.co/llBhNjRkCB
0
4
18
@ProgrammerWkly
Programmer Weekly
4 years
Put an io_uring on it: Exploiting the Linux Kernel via @GraplSec https://t.co/9Hv4FPir1c #linux
0
3
8
@arstechnica
Ars Technica
4 years
Researcher uses Dirty Pipe exploit to fully root a Pixel 6 Pro and Samsung S22 https://t.co/IU9Zauot01 by @dangoodin001
Tweet card summary image
arstechnica.com
It was bound to happen. Worst Linux vulnerability in 6 years fells two popular handsets.
0
29
67
@chompie1337
chompie
4 years
Thrilled to share my new blog post: Put an io_uring on it: Exploiting the Linux kernel. Follow me while I learn a new kernel subsystem + its attack surface, find an 0day, build an exploit, + come up with some new tricks. I go deep and demystify the process https://t.co/bGEHcjWXrP
43
606
2K
@GraplSec
Grapl Inc.
4 years
#io_uring is a new #Linux syscall interface, designed for performance. It redefines how apps interact with the kernel, even inside a #sandbox. In our blog, we cover the attack surface, find a vuln, and use advanced kernel exploit techniques to gain #root https://t.co/hmCVbeuXyg
0
16
71
@bsdaemon
Rodrigo Branco
4 years
This is an outstanding work. I've had the privilege to see @wipawel work thru this research. The post has many references, excellent background info and offers a methodology that can be used for other experiments too (besides the cool finding!)
@grsecurity
grsecurity
4 years
Today we present deep research from our @wipawel into the branch predictor of AMD CPUs and abusing its behavior to exploit Spectre v1 much more easily than previously understood, culminating in reproducing an arbitrary kernel mem leak PoC in only 3 days. https://t.co/JhAgwfqhKs
0
10
27
@wwiimmaaxx
max wittek
4 years
computers were a mistake
2
1
10
@and_zza
Andréa
4 years
Could not be more excited to get this book from @snyksec's #31DaysOfSecurity giveaway today! I'm blown away by how thoughtful this choice is! Can't wait to integrate what I learn into my work @GraplSec! So grateful!! What an excellent start to my week!
1
6
19
@chompie1337
chompie
4 years
So excited to finally release my blog post- Kernel Pwning with eBPF: a Love Story. I cover eBPF, the verifier, debugging, exploitation, mitigations and other cool findings! I do root cause analysis and exploit CVE-2021-3490 for LPE with PoC included.
30
539
2K
@GraplSec
Grapl Inc.
4 years
#eBPF is a powerful #Linux capability for devs who want to run code in the kernel, but it also makes for great attack surface. In our blog, @chompie1337 digs into eBPF, explains how it works, and demonstrates a local privilege escalation exploit! https://t.co/7Yq4Qr4XnS
0
23
85
@GraplSec
Grapl Inc.
4 years
We have! Very happy to have @d0nutptr onboard!
@DanielMiessler
ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ 🛡️
4 years
Has anyone else noticed the massive amount @d0nutptr gives the community? Quietly. And consistently. Respect.
0
0
8
@GraplSec
Grapl Inc.
4 years
One year ago #SigRed (CVE-2020-1350) was patched. The RCE vulnerability allows an attacker to gain access as Domain Admin and own the entire network. Read our writeup on the the first public exploit from our very own @chompie1337!
0
100
226
@h0mbre_
h0mbre
5 years
writing secure C right now by just focusing really hard. should tell other ppl about this
8
22
146