Tweetovi

Blokirali ste korisnika/cu @RZ_fluorescence

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RZ_fluorescence

  1. proslijedio/la je Tweet

    That's a wrap! Congrats to on winning Master of Pwn. There total was $375,000 (plus a vehicle) for the week. Superb work from this great duo.

    Poništi
  2. proslijedio/la je Tweet

    Confirmed! The duo used a JIT bug in the renderer to win $35,000 and a Model 3. What a great way to kick off the automotive category of .

    Poništi
  3. proslijedio/la je Tweet

    The duo does it again. They used a type confusion in , a race condition in the kernel, then an out-of-bounds write in to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points.

    Poništi
  4. proslijedio/la je Tweet

    That brings to an end Tokyo 2018! Congrats to team on earning 45 points and being crowned Master of Pwn!

    Poništi
  5. proslijedio/la je Tweet

    Confirmed! The duo used an integer overflow in the JavaScript engine of the web browser to exfiltrate a picture from the phone. They earn $25K and 6 Master of Pwn points.

    Poništi
  6. proslijedio/la je Tweet

    Confirmed! The duo combined a bug in JIT with an Out-Of-Bounds Access to exfiltrate data from the iPhone. In the demo, they grabbed a previously deleted photo. In doing so, they earn themselves $50K and 8 Master of Pwn points.

    Poništi
  7. proslijedio/la je Tweet

    Confirmed! The dynamic duo used a JIT bug followed by an Out-Of-Bounds write to get code execution on the . They earned themselves an additional $60K and 10 more Master of Pwn points.

    Poništi
  8. proslijedio/la je Tweet

    Confirmed! The team of successfully got code execution by using a heap overflow in the baseband component. The exploit earns them $50,000 USD and 15 more Master of Pwn points.

    Poništi
  9. proslijedio/la je Tweet

    Confirmed! Our 1st attempt at Tokyo becomes our 1st successful entry. (Amat Cama and Richard Zhu) used an out-of-bounds write in WebAssembly to get code execution via NFC on the Mi6. They earn $30K USD and 6 Master of Pwn points!

    Poništi
  10. 12. lip 2018.

    ios 11.4 jailbreak

    Poništi
  11. proslijedio/la je Tweet

    Congrats to on being named Master of Pwn for 2018! His exploits for Edge and Firefox earned him $120,000, this sweet jacket, and the trophy. We hope he returns in the future to defend his title.

    Poništi
  12. proslijedio/la je Tweet

    Confirmed! used an OOB write in the browser & an integer overflow in the Windows kernel to pop and execute his code w/ elevated privileges. Earns $50K & 5 Master of Pwn points. His event total is now $120,000.

    Poništi
  13. proslijedio/la je Tweet

    Boom! No drama for today as he takes down FireFox on his first attempt. Now off to the disclosure room for confirmation and vendor notification.

    Poništi
  14. proslijedio/la je Tweet

    Confirmed! After plenty of drama -including reworking his exploit live, on the clock, in front of a crowd- used 2 UAFs in Edge and an integer overflow in the kernel to win $70,000 and 7 points towards Master of Pwn.

    Poništi
  15. proslijedio/la je Tweet

    Confirmed! Richard Zhu (fluorescence) uses 2 bugs to escape sandbox and executed code on iOS 11.1. Earns $20K in the process.

    Poništi
  16. proslijedio/la je Tweet

    Success! Richard Zhu (fluorescence) used 2 separate UAFs in Edge then escalated to SYSTEM w/ a kernel bug. Gets $55K for popping shell. 💰💰💯

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·