Jump to content

Dibya

Member
  • Posts

    2,134
  • Joined

  • Last visited

  • Days Won

    7
  • Donations

    0.00 USD 
  • Country

    India

Posts posted by Dibya

  1. Don't use Export table tester to add export .it will cause certain tables to break . Never add a section after resources table in NT system files

    Use Petools to move Table to new section before .reloc then add anything you like.

    If you are not using vanilla file , then wildbill/bwc shall have enough space .

    Use the blank space inside .TXT , no need to add another section for code

  2. 22 hours ago, Sampei.Nihira said:

    FranceBB wrote:

    Presumably I.E.9 x86 on Windows Server 2008.

    What is the version number of jscript.dll after applying the patch?

    Have other files of I.E.8 also been updated by the patch?

     

    Well it is not a port of newer jscript , it patches out vulnerability in windows XP IE8 file .

    i never said as such to FranceBB i think its a miss understanding 

    JScript of vista will require expansion of kernel with new api , which i am not willing to do since it may break old XP only programs 

    implementation of patch is unique as it prevent any such vulnerability .

    CVE2020-0674(0 Day) is variant of CVE2019-1429(0 Day)

  3. 1 hour ago, Sampei.Nihira said:

    Go Dibya.:yes:

    Has anyone applied both patches, or even a single patch?

    Let me fix the uninstaller first . @win32 pointed it out.  Then if theirs a bug anyone can uninstall it .

    Well anyone have any idea how much dangerous CVE-2020-1048 is .

    https://windows-internals.com/printdemon-cve-2020-1048/

    In Their blog ,

    https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.html

    0patch Fix mentions LcmCreatePortEntry but nowhere IDA Pro , Relyze & PEExplorer find such reference .

    Patch_436_source_code.png

  4. CVE2020-0674(0 Day),CVE2019-1429(0 day) are variant of each other . Microsoft did some quick fix but bad guys can easily work around it so i made a own patch to harden it.

    I have carefully studied work of 0patch but their patch is kill switch for JScript. 

    So I made my own work around to fix it .

    https://blog.0patch.com/2020/01/micropatching-workaround-for-cve-2020.html

    My patch in action

    https://i.ibb.co/jhpqgrN/Vulnerability-Fixed.png

    It prevents both JSEncode & JSCompat vulnerability (Thanks to 0patch to find out JSCompat too can be used)

    Edit: I had no intention to share this patch but shared it as my friends asked me to .

    Some people likes to judge on basis of your age not your skill . Mastering x86 Assembly takes time . 

    People are using my patch in wrong way then blaming me , Like using nlite addon without nlite despite knowing SFC can replace back original files from SP3.cab 

    Many russian and chinese devs copied my RAM patch without my consent .  

    one of my friends sent me 

     

    ''I tried this too before. Don't expect too much from it as it was made by some teenage indian dude lol" Sounded racist to me .

    First they are dump to use nlite addon in wrong way and blame me without disabling SFC.

    In future , I will keep my patches to me . Why shall i bother ? WHat is the use of sharing and caring philosophy ? why shall i waste my bandwidth which i could use to watch anime ?

  5. 19 hours ago, WinFX said:

    Yes, in firefox 12 I have that error. I use the blackwingcat kernel32 addresses for Windows 2000, which does not call any instructions, instead the one from SP3 calls NTDLL and I don't know if it works.
    I Fixed "No more room for sections" bug in PEMaker with Del Rich.

    You didn't add any code with hex editor. That's the reason.

    I am comparing dlls with sp3 , I am looking out for changes made if any fix needed.

    Just wait I will do it for you .

     

  6. CVE-2020-0668: Disable Windows Service Tracing
    CVE-2019-1089: Disable RPC
    CVE-2020-0645 : Disable IIS
    CVE-2020-0772,CVE-2019-1315, CVE-2019-1339,CVE-2019-1319: Disable Windows Error Reporting
    CVE-2020-0787 : Disable Bits
    CVE-2019-0887,CVE-2019-1108,CVE-2019-1089,CVE-2019-1177,CVE-2019-1333,CVE-2019-1326 : Disable RDP
    CVE-2020-0770: Disable Windows ActiveX Installer
    CVE-2020-0822 : Disable Windows Language pack installer
    CVE-2020-0781, CVE-2020-0783 , CVE-2019-1405 : Disable Universal Plug & Play
    CVE-2020-0625, CVE-2020-0626, CVE-2020-0627, CVE-2020-0628, CVE-2020-0629, CVE-2020-0630, CVE-2020-0631, CVE-2020-0632 : Disable Windows Search Indexing

×
×
  • Create New...