Brian Gorenc

@MaliciousInput

Leader of the Zero Day Initiative. Pwn2Own organizer and adjudicator. Trafficker of export-controlled intrusion software. Bug Hunter.

Austin, Tx
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @MaliciousInput

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MaliciousInput

  1. proslijedio/la je Tweet

    Taking a look at what we published in 2019. What was the most popular vendor? The most common ? All this and more in our 2019 retrospective.

    Poništi
  2. proslijedio/la je Tweet

    To get set for Miami, exploits a SCADA bug submitted by and shows how you can too. See how he pops calc at

    Poništi
  3. proslijedio/la je Tweet

    We're just a week away from Miami. If you can't be there, enjoy this inspired poster we created for the event. Hope to see you there!

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Excited to open up pivots, USB and (more importantly) ethernet attack surface to the competition this year. Will definitely make things more interesting. Hope to see you in Vancouver!

    Poništi
  5. proslijedio/la je Tweet

    We're excited to announce Vancouver 2020 with new categories and returning partners, & along with sponsor . More than $1,000,000 USD available - plus a Model 3! Details at

    Poništi
  6. proslijedio/la je Tweet

    In the final blog of our Top 5 bugs of 2019, details a privilege escalation via the core shell COM registrar object in .

    Poništi
  7. proslijedio/la je Tweet

    For Day 4 of our Top 5 bugs of 2019, details how the duo used a RegExp vuln in the infotainment system to win a Model 3 at this year.

    Poništi
  8. proslijedio/la je Tweet

    Day 3 of our Top 5 bugs of 2019 is a RCE we detailed back in March (CVE-2019-0604). Today, we look at the impact of that bug and the attacks seen in the wild.

    Poništi
  9. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  10. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  11. proslijedio/la je Tweet

    Today at , researcher joined ZDI's as they present how finding bugs in Acrobat Reader lead to better defenses.

    Poništi
  12. proslijedio/la je Tweet
    4. pro 2019.
    Poništi
  13. proslijedio/la je Tweet

    Start off the week with the 2nd part of 's look into reversing a TP-Link TL-WR841N wireless router. His write-up includes a full exploit & a video demonstration of ZDI-19-992.

    Poništi
  14. proslijedio/la je Tweet
    12. stu 2019.

    Thank you and for supporting us as gold sponsors!

    Poništi
  15. proslijedio/la je Tweet

    Windows isn't a favorite feature, but details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)

    Poništi
  16. proslijedio/la je Tweet

    Confirmed! The team used an integer overflow in JavaScript to compromise the device and take control. They earned $60,000 USD and 6 more Master of Pwn points.

    Poništi
  17. proslijedio/la je Tweet

    Success! The Flashback team of and were able to get a shell off the LAN interface of the router. They're headed to the disclosure room for details and confirmation.

    Poništi
  18. proslijedio/la je Tweet

    Confirmed! The duo used a Javascript OOB Read bug to exploit the built-in browser to get a bind shell from the TV. They earned $15K and 2 Master of Pwn points to start the contest off with a bang.

    Poništi
  19. proslijedio/la je Tweet

    This is some great research on active threats. Happy to see this write-up on what’s being exploited in the wild. RT :

    Poništi
  20. proslijedio/la je Tweet

    Hello Tokyo! We’ve updated phones, routers, and televisions. Everything is almost ready for Tokyo kicking off tomorrow. Stay tuned for the schedule and live results.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·