Ferran Celades

@_fr0zn

Security Researcher and Open Source lover. CTF Player.

cat /dev/urandom
Vrijeme pridruživanja: travanj 2013.

Tweetovi

Blokirali ste korisnika/cu @_fr0zn

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_fr0zn

  1. proslijedio/la je Tweet
    27. stu 2019.

    New video about the suidbash challenge from the Google CTF Finals 2019. It's about an actual zero-day in /bin/bash - CVE-2019-18276 🔴

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    19. ruj 2019.

    Congratulations for solving the BFS challenge! The winners In order of submission: 1. 2. 3. 4. 5. 6. 7. 8. 9.

    Poništi
  3. 8. ruj 2019.

    This year the ctf from was amazing, congrats to the organizers for the great challenges. If you didn't play don't forget to sign up next year!

    Poništi
  4. proslijedio/la je Tweet
    20. kol 2019.

    Writeup for VM Escape found by our team member : In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!

    Poništi
  5. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  8. proslijedio/la je Tweet

    It's that time of the year! We unveiled MSRC’s 2018-2019 Most Valuable Security Researchers at Black Hat USA this morning. If you cannot make it to the Microsoft booth, check out the list in our blog. Congratulations and thank you!

    Poništi
  9. proslijedio/la je Tweet
    3. kol 2019.

    A database of all Debian libc's (amd64, i386, arm, arm64, mips, mips64, ppc, ppc64, x32 and s390) by

    Poništi
  10. proslijedio/la je Tweet
    26. tra 2019.

    Nice writeup for a VM escape challenge which was 0day at the time: At least two unintended bugs (also 0day) were found during the CTF

    Poništi
  11. proslijedio/la je Tweet
    5. tra 2019.
    Prikaži ovu nit
    Poništi
  12. 19. velj 2019.

    The talk from at is now available - Bruno Keith - Attacking Edge Through the JavaScript Just-In-Time Compiler

    Poništi
  13. proslijedio/la je Tweet
    29. sij 2019.

    The A12, now with more kernel code execution; introducing voucher_swap:

    Poništi
  14. proslijedio/la je Tweet
    2. sij 2019.

    # Best New Year gift for myself :) VM escape again! This time it's qemu. Both guest and host are Ubuntu 18.04.1 with the default configuration of qemu. I exploited it with a single bug. If it's possible, I'll release the exploit and details after the fixing.

    Poništi
  15. proslijedio/la je Tweet
    1. pro 2018.

    RPISEC has successfully pwned the Safari browser and spawned a calculator on the victim host at their first attampt during the demostration!

    Poništi
  16. proslijedio/la je Tweet

    35C3 event is now on CTFTime Registration: Junior CTF: Both can be played online! Tomorrow is your last chance to register an assembly in the CTF area at C3

    Poništi
  17. proslijedio/la je Tweet
    20. stu 2018.

    reminder: if you've read my book Serious Crypto and have useful (positive or negative) comments for potential future readers, please consider adding a review to (also, please report typos and other errors to me directly)

    Poništi
  18. proslijedio/la je Tweet

    And just like that - (Amat Cama and Richard Zhu) successfully demonstrated an NFC exploit on the Mi6! Off to the disclosure room for verification and details.

    Poništi
  19. 11. stu 2018.

    Verifying myself: I am fr0zn on . zlNMfqQSF22LRLUZCiAjIaJkGe7hUNqUn-Z3 /

    Poništi
  20. 11. stu 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·