Ahn Ki Chan

@Externalist

Bughunting & Exploitation

South Korea
Vrijeme pridruživanja: siječanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Externalist

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Externalist

  1. Prikvačeni tweet
    23. sij 2019.

    My first blog post at ! It was an interesting bug to work with, and there's probably better ways to do it, but this is how I did it. I'm curious what the Blade team's solution was to this problem. 🙂

    Poništi
  2. proslijedio/la je Tweet
    21. sij
    Poništi
  3. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  7. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  9. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  10. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  11. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    29. pro 2019.

    The talk by about building KTRW is up! Great work by an amazing guy :) This was a serious year for iOS research, a lot of non trivial gaps have been crossed by the great community :)

    Poništi
  14. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  15. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    27. pro 2019.

    Hey guys here's my kernel exploit (+ pov) writeup talked about in his talk:

    Poništi
  18. proslijedio/la je Tweet
    27. pro 2019.

    I hope you enjoyed the talk! I was quite nervous for my first time talking at a conference You might want to check out the full version of my slides with a bit more details:

    Poništi
  19. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  20. proslijedio/la je Tweet

    In the final blog of our Top 5 bugs of 2019, details a privilege escalation via the core shell COM registrar object in .

    Poništi
  21. proslijedio/la je Tweet

    For Day 4 of our Top 5 bugs of 2019, details how the duo used a RegExp vuln in the infotainment system to win a Model 3 at this year.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·