Obscillum Profile Banner
Obscillum Profile
Obscillum

@Obscillum

Followers
18
Following
9
Media
0
Statuses
36

Diving into cybersecurity research, uncovering vulnerabilities & exploits. Shedding light on digital shadows, one discovery at a time. 💻 #InfoSec #CyberSec

Aether
Joined April 2023
Don't wanna be here? Send us removal request.
@andreyknvl
Andrey Konovalov
2 years
The "Randomized slab caches for kmalloc()" patch was merged into mainline. With CONFIG_RANDOM_KMALLOC_CACHES=y, each kmalloc cache is split into 16. kmalloc uses a random one for each allocation based on the code location. Choices change every reboot. https://t.co/EoSYZxc8gI
1
34
110
@Obscillum
Obscillum
3 years
🤝 Follow us for more updates as we continue our analysis of CVE-2023-28227 and work towards uncovering the true nature of this bug. 🕵️💡 #VulnerabilityResearch #StayInformed
0
0
1
@Obscillum
Obscillum
3 years
📏 This value is 15 bytes less than the L2CAP MTU 0x69B (1,691) in relation with BNEP. We're digging deeper to understand the implications of this change. ⚙️🔬 #L2CAP #MTU
1
0
1
@Obscillum
Obscillum
3 years
🔧 The BnepBookmarkIncomingPacket() function seems to be involved. An additional check is now performed before entering a while loop to ensure that r14_2 <= 0x68c (1,676). 📝🔐 #FunctionAnalysis
1
0
1
@Obscillum
Obscillum
3 years
🔍 Preliminary findings suggest the vulnerability may be related to a patch in the bthpan.sys kernel driver, responsible for Bluetooth Personal Area Network. 🌐💻 #BthpanSys #KernelDriver
1
0
1
@Obscillum
Obscillum
3 years
🚨 Early info on CVE-2023-28227: Windows Bluetooth RCE! 🧐 We're working hard to analyze the patch and pinpoint the bug. Stay tuned for updates! #CVE2023 #BluetoothRCE #WindowsSecurity
1
0
2
@Obscillum
Obscillum
3 years
🔍 Boost product security with Variant Analysis! 🌐💡 Discover its benefits in our latest blog post. 🚀 Let's work together to stay ahead of cyber adversaries. ✨🤝 📚 Read more: https://t.co/nKz6yD8r3g 📞 Contact us for a FREE consultation. #VariantAnalysis #ObscillumResearch
obscillum.com
Outline Introduction What is Variant Analysis? The Impact of Variant Analysis on Product Security Shifting from Arcane Methods to Comprehensive Variant Analysis Benefits of Variant Analysis for...
0
0
2
@Obscillum
Obscillum
3 years
🌐 Discover more about the importance of variant analysis in product security by checking out the full post on Obscillum's LinkedIn page! 📖🔗 #LinkedInPost #LearnMore ➡️
linkedin.com
Obscillum Research LLC | 21 followers on LinkedIn. Empowering Cybersecurity Research: Uncovering Hidden Insights to Safeguard Your Digital Future | Welcome to Obscillum, a cybersecurity research firm...
0
0
2
@Obscillum
Obscillum
3 years
🎯 By doing so, organizations can identify and patch similar vulnerabilities within their products, enhancing their product security posture and staying ahead of adversaries. ⚔️🛡️ #StayAhead #RobustSecurity
1
0
1
@Obscillum
Obscillum
3 years
✅ While this is great for researchers, businesses should also adopt a proactive approach by performing variant and root cause analysis internally before vulnerabilities are disclosed publicly. 🛡️🔍 #ProactiveSecurity
1
0
1
@Obscillum
Obscillum
3 years
📚 From firsthand experience in responsible disclosure, We have seen researchers race to perform root cause and variant analysis on newly discovered vulnerabilities. Their goal? To find variants and submit them to bug bounty programs. 🏃‍♂️💰 #BugBounty #ResponsibleDisclosure
1
0
1
@Obscillum
Obscillum
3 years
🚀 Have you considered the power of variant analysis in product security? It's time to dive into the benefits of this often-underestimated approach. 🧐💡 #ProductSecurity #VariantAnalysis
1
0
1
@Obscillum
Obscillum
3 years
😃 If you found these insights into the thought process and logic behind vulnerability research helpful, give us a follow for more valuable content! 🌟 @Obscillum #VulnerabilityResearchTips
0
0
0
@Obscillum
Obscillum
3 years
📈 Vulnerability research is a journey, and staying informed is key. Keep learning, and you'll become a more effective researcher, contributing to the security of large, complex systems. 🏆 #StayInformed #VulnerabilityResearchSuccess
1
0
0
@Obscillum
Obscillum
3 years
📚 Keep learning and updating your knowledge of attack vectors, coding patterns, and best practices. This will help you better identify potential issues and improve your vulnerability hunting strategy. 🧠 #ContinuousLearning #SecurityExpertise
1
0
0
@Obscillum
Obscillum
3 years
🔧 Another tip is to automate your process as much as possible. Use tools that help you track, identify, and record these functions. This way, you can keep an eye on potential security risks that might arise from human error in future updates. 🛠️ #Automation #SecurityTools
1
0
0
@Obscillum
Obscillum
3 years
🕵️‍♂️ When auditing code, don't dismiss non-exploitable bugs. Keep detailed notes on them, and monitor the areas of code where they occur. This vigilance will help you spot when a developer forgets to properly check the return value or input args. 🔍 #CodeAudit #SecurityAwareness
1
0
0
@Obscillum
Obscillum
3 years
📝 It's crucial to keep track of those functions where the caller is responsible for handling checks before and after the given function call. Why? Because developers are human, and mistakes can happen! 🙌 #DeveloperMistakes #InsecureCode
1
0
0
@Obscillum
Obscillum
3 years
🚀 Getting started with vulnerability research on large, complex targets can be daunting. But what do you do with non-exploitable bugs found within simple routines that return a size value, where the caller is responsible for verification? 🧐 #BugHunting #VulnerabilityResearch
1
0
1