<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>windows &#8211; SCRT Team Blog</title>
	<atom:link href="/tag/windows/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Orange Cyberdefense Switzerland&#039;s technical blog</description>
	<lastBuildDate>Thu, 12 Jan 2023 14:46:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>/wp-content/uploads/2024/10/cropped-favicon-32x32-1-32x32.png</url>
	<title>windows &#8211; SCRT Team Blog</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>winhttpd writeup: private heaps pwning on Windows</title>
		<link>/2019/01/24/private-heaps-pwning-on-windows/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 08:52:35 +0000</pubDate>
				<category><![CDATA[Insomni'hack]]></category>
		<category><![CDATA[heap]]></category>
		<category><![CDATA[pwn]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[writeup]]></category>
		<guid isPermaLink="false">/?p=2481</guid>

					<description><![CDATA[Following last week-end&#8217;s Insomni&#8217;hack teaser and popular demand, here is a detailed write-up for my winhttpd challenge, that implemented a custom multi-threaded httpd and was running on the latest version of Windows 10: This challenge is running on Windows Server 2019, Version 1809 (OS Build 17763.253). Since multi-threaded servers have obvious isolation issues for a &#8230; <a href="/2019/01/24/private-heaps-pwning-on-windows/" class="more-link">Continue reading <span class="screen-reader-text">winhttpd writeup: private heaps pwning on Windows</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Exploiting a misused C++ shared pointer on Windows 10</title>
		<link>/2017/01/27/exploiting-a-misused-c-shared-pointer-on-windows-10/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Fri, 27 Jan 2017 10:17:28 +0000</pubDate>
				<category><![CDATA[Insomni'hack]]></category>
		<category><![CDATA[control flow guard]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[rop]]></category>
		<category><![CDATA[use after free]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[writeup]]></category>
		<guid isPermaLink="false">/?p=2118</guid>

					<description><![CDATA[In this post I describe a detailed solution to my &#8220;winworld&#8221; challenge from Insomni&#8217;hack CTF Teaser 2017. winworld was a x64 windows binary coded in C++11 and with most of Windows 10 built-in protections enabled, notably AppContainer (through the awesome AppJailLauncher), Control Flow Guard and the recent mitigation policies. These can quickly be verified&#160;using Process &#8230; <a href="/2017/01/27/exploiting-a-misused-c-shared-pointer-on-windows-10/" class="more-link">Continue reading <span class="screen-reader-text">Exploiting a misused C++ shared pointer on Windows 10</span></a>]]></description>
		
		
		
			</item>
		<item>
		<title>Catalogue de formations 2013</title>
		<link>/2013/03/17/catalogue-de-formations-2013/</link>
		
		<dc:creator><![CDATA[blogscrt]]></dc:creator>
		<pubDate>Sun, 17 Mar 2013 17:10:11 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[forensic]]></category>
		<category><![CDATA[formation]]></category>
		<category><![CDATA[fortinet]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[ios]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[log]]></category>
		<category><![CDATA[owasp]]></category>
		<category><![CDATA[training]]></category>
		<category><![CDATA[vmware]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">/?p=992</guid>

					<description><![CDATA[Pour 2013 SCRT étoffe à nouveau son catalogue de formations techniques afin de répondre au mieux au monde de la sécurité en perpétuelle évolution, notamment avec les formations sur le développement d&#8217;applications pour terminaux mobiles (COD102 &#38; COD103) ainsi que la gestion des logs dans le contexte de la sécurité informatique (FOR102). Vous trouverez dans &#8230; <a href="/2013/03/17/catalogue-de-formations-2013/" class="more-link">Continue reading <span class="screen-reader-text">Catalogue de formations 2013</span></a>]]></description>
		
		
		
			</item>
	</channel>
</rss>
