Eyal Itkin

@EyalItkin

Security vulnerability researcher at Check Point (). Tweets are my own, and will focus white-hat research.

Vrijeme pridruživanja: prosinac 2017.
Rođen/a 1992.

Tweetovi

Blokirali ste korisnika/cu @EyalItkin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EyalItkin

  1. Prikvačeni tweet
    11. kol 2019.

    This was my most enjoyable research thus far: "Say Cheese - How I Ransomwared Your DSLR camera". How vulnerabilities in the Picture Transfer Protocol (PTP) allowed us to remotely take over digital cameras, infecting them with ransomware.

    Poništi
  2. prije 5 sati

    A busy day for : and presenting "Bugs on the Windshield: Fuzzing the Windows Kernel" at

    Poništi
  3. prije 7 sati

    Can't believe that last week I requested NVD to *downgrade* the CVSS score of my CVE-2020-6007. For some reason they invented a vector of "Critical", when it was supposed to be "High". When I report a vulnerability it should be accurate, even when it's against me.

    Poništi
  4. proslijedio/la je Tweet

    Executing code on Philips Hue Smart Hub through the ZigBee protocol, and infiltrating your way into the internal network. Technical details will follow soon.

    Poništi
  5. prije 9 sati

    3/ Last but not least, I wanted to thank again for his guidance throughout this research. It was a pleasure to continue on the great research he published alongside :

    Prikaži ovu nit
    Poništi
  6. prije 9 sati

    2/ The technical blog post will be released in the future, stay tuned. We decided to give users a grace period to safely update their products before we publish all the details.

    Prikaži ovu nit
    Poništi
  7. prije 9 sati

    1/ I can finally share the exploit demo video for CVE-2020-6007: TL;DR: We managed to infiltrate into a computer network using an over-the-air Zigbee exploit on the Philips Hue Bridge (smart lightbulbs controller).

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. sij

    In the past year, I was researching Azure Stack, which is an on-premise version of Azure Cloud. In the following blog posts, we present information on what is Azure Stack and its architecture and disclose a vulnerability in Azure App Service that allowed a sandbox escape.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    I had the privilege of assisting on this research, great researcher and very interesting research! You should check it out if you're interested to know a bit of how a cloud provider works

    Poništi
  10. proslijedio/la je Tweet

    Remote Code Execution and Sensitive Information Theft in Microsoft Azure, along with infrastructure overview (2 Parts):

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Vulnerability we found in Zoom allowed attackers to eavesdrop on random conversations

    Poništi
  12. proslijedio/la je Tweet
    21. sij
    Poništi
  13. proslijedio/la je Tweet
    20. sij

    The wait is finally over! Registration & schedule for 2020 are live. Places are limited so register NOW:

    Poništi
  14. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  16. proslijedio/la je Tweet
    29. pro 2019.

    Excited to be speaking at tonight If you are interested in cyberattacks in the Middle East, this talk is for you!

    Poništi
  17. 29. pro 2019.

    Great methodical research about security mitigations and OpenBSD:

    Poništi
  18. 28. pro 2019.

    Don't miss talk today at 22:10 - Breaking blu-ray in Sony PlayStation

    Poništi
  19. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    27. pro 2019.

    is about to break SQLite once more. If you’re at come and join the party at dijkstra hall!

    Poništi
  21. proslijedio/la je Tweet
    23. pro 2019.

    Just published a new blog-post >> 5 ways to patch binaries with Cutter 🚀 Yes, you can patch from the decompiler! It's not a long article but it feels great to write again! I missed it. Check it out @

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·