Kira

@0xKira233

/ CTF@AAA & A*0*E / admirer

Vrijeme pridruživanja: kolovoz 2017.

Tweetovi

Blokirali ste korisnika/cu @0xKira233

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xKira233

  1. Prikvačeni tweet
    2. sij 2019.

    # Best New Year gift for myself :) VM escape again! This time it's qemu. Both guest and host are Ubuntu 18.04.1 with the default configuration of qemu. I exploited it with a single bug. If it's possible, I'll release the exploit and details after the fixing.

    Poništi
  2. proslijedio/la je Tweet
    9. pro 2019.

    Exploring the MediaTek Baseband by and Kira (Xingyu Chen)

    Poništi
  3. 4. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    1. srp 2019.
    Poništi
  5. proslijedio/la je Tweet
    19. lip 2019.
    Odgovor korisnicima

    Very similar to my exploit on CVE-2017-5053, which we used for Pwn2Own 2017. I planned to share it at Black Hat but seems not fresh any more lol.

    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. 13. lip 2019.

    Forget to mention that the first half part of the slide is excellent intro to virtualization and vbox. Definitely helpful to someone wants to start.

    Prikaži ovu nit
    Poništi
  8. 13. lip 2019.

    VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience😅

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. svi 2019.
    Poništi
  10. proslijedio/la je Tweet
    7. svi 2019.

    Sadly we had those UHCI bugs for long time, RIP At least happy that was doing the killing of one of mine😎

    Poništi
  11. proslijedio/la je Tweet

    Fourth speaker @ Zer0con2019 Marco Grassi() and Kira(@KiraCxy) on the stage, presenting Vuln discovery and exploitation of virtualization solutions for cloud computing and desktops! Shout out to Marco & Kira!

    Poništi
  12. 22. ožu 2019.
    Poništi
  13. proslijedio/la je Tweet

    Just pushed 5 for IDA 7.2. Windows. Linux. macOS. Get yours: File bugs: Thanks everyone testing prerelease binaries, though not all fixes made it in this release. Let's hope, we'll get into a habit of releasing more often.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    3) Speaker of Zer0Con: Marco Grassi() and Xingyu Chen(aka Kira) Topic: Vulnerability Discovery and Exploitation of Virtualization Solutions for Cloud Computing and Desktops TBA

    Poništi
  15. proslijedio/la je Tweet
    22. sij 2019.

    Here is the PoC of the bug I used to jailbreak can work before 12.1.2..The blog post about exploit on A12 will come soon.😀

    Poništi
  16. proslijedio/la je Tweet
    18. sij 2019.

    I've just pushed my changes to the repository: it now performs paralellized diffing.

    Poništi
  17. proslijedio/la je Tweet
    18. sij 2019.

    VirtualBox TFTP server (PXE boot) directory traversal and heap overflow vulnerabilities -

    Poništi
  18. 14. sij 2019.
    Poništi
  19. 11. sij 2019.

    this is nonsense cuz lokihardt is not on the first place.

    Poništi
  20. proslijedio/la je Tweet
    1. sij 2019.

    2019 is the final year for Python 2. No bug or security patches will be applied to Python 2 beyond Jan 1st, 2020. Time to start using Python 3 only!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·