Gengming Liu

@dmxcsnsbh

CTF@eee TEAM, CTF@A*0*E TEAM, Security Researcher at KeenLab.

Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @dmxcsnsbh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dmxcsnsbh

  1. 4. pro 2019.

    Better late than never. Official writeup repo from A*0*E release, along with the aforementioned tricky exp in the gomium challenge.

    Poništi
  2. 16. stu 2019.

    Congrats but some mistake. The exploit from Team ddd should be credit to Zhen Feng and me. We are going to release the details of the bug and exploitation after the bug fixed.

    Poništi
  3. proslijedio/la je Tweet
    6. stu 2019.

    is giving his talk, "Chrome Exploitation.”

    Prikaži ovu nit
    Poništi
  4. 4. stu 2019.

    Is it alright if we release our exploitation of gomium challenge?

    Poništi
  5. proslijedio/la je Tweet

    Here we have more speakers to get you warmed up! - Cristofaro Mune & Niek Timmers, "Using Fault Injection for Turning Data Transfers into Arbitrary Execution" - Gengming Liu, "Chrome Exploitation" (Title may be changed)

    Poništi
  6. 26. ruj 2019.

    First bug collision in Chrome Sandbox, IndexedDB may no longer be a good target lol.

    Poništi
  7. proslijedio/la je Tweet
    4. ruj 2019.

    My last week in KeenLab. Thanks for all friends. Thank and for bringing me here.

    Poništi
  8. 7. kol 2019.
    Poništi
  9. 7. kol 2019.

    I'm going to give my talk at 11:15 in islander EI about chrome security. Hope to see you there!

    Poništi
  10. proslijedio/la je Tweet
    6. kol 2019.

    Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:

    Poništi
  11. proslijedio/la je Tweet
    8. svi 2019.

    Congratulations! The talk and submitted was accepted to 2019. Their session "The Most Secure Browser? Pwning Chrome from 2016 to 2019" will present their research on Chrome, including v8 and sandbox bypass.

    Poništi
  12. 22. ožu 2019.

    All bugs have been reported to Google and got confirmed last week. Special thanks to and

    Prikaži ovu nit
    Poništi
  13. 22. ožu 2019.

    Congrats to , you guys are really incredible! Seems Chrome become the winner in Browser Security again, but together with , ZhenFeng, and , we successfully pwned it in a reliable success rate :)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. sij 2019.

    # Best New Year gift for myself :) VM escape again! This time it's qemu. Both guest and host are Ubuntu 18.04.1 with the default configuration of qemu. I exploited it with a single bug. If it's possible, I'll release the exploit and details after the fixing.

    Poništi
  15. proslijedio/la je Tweet

    Confirmed! After plenty of drama -including reworking his exploit live, on the clock, in front of a crowd- used 2 UAFs in Edge and an integer overflow in the kernel to win $70,000 and 7 points towards Master of Pwn.

    Poništi
  16. proslijedio/la je Tweet
    10. stu 2017.

    "Remotely gain root on Android via NFC": a demo I showed at . Credit also goes to ZhenFeng of

    Poništi
  17. proslijedio/la je Tweet
    5. lis 2017.

    Nice article. Just look forward to more our competitor's bug writeups as it looks like too many articles for bugs found by Tencent.

    Poništi
  18. proslijedio/la je Tweet
    3. kol 2017.

    CVE-2017-7047 & Triple_Fetch Analysis, I am too lazy to write English version:

    Poništi
  19. proslijedio/la je Tweet
    27. srp 2017.
    Poništi
  20. proslijedio/la je Tweet
    23. lip 2017.

    . private 10.3.2 and 11 beta 2 iOS jailbreak demo at , awesome!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·