Tweetovi

Blokirali ste korisnika/cu @fluoroacetate

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fluoroacetate

  1. proslijedio/la je Tweet

    That brings Tokyo 2019 to a close. Congrats to on successfully defending their Master of Pwn title. In two days, they racked up $195,000 for their research. Congrats!

    Poništi
  2. proslijedio/la je Tweet

    Success! The prolific duo was able to get a shell on the router. They're headed back to the disclosure room to provide all the details.

    Poništi
  3. proslijedio/la je Tweet

    Success! The duo got the Galaxy S10 to connect to their rogue base station and then pushed a file to the phone. Third year in a row. Off to the disclosure room to get all the details.

    Poništi
  4. proslijedio/la je Tweet

    Confirmed! The duo used a bug in JavaScript JIT followed by a UAF to escape the sandbox to grab a pic off a Galaxy S10 via NFC. Their final entry for Day One earns them $30,000 and 3 Master of Pwn points.

    Poništi
  5. proslijedio/la je Tweet

    Confirmed! The duo used a JavaScript bug that jumped the stack to exfiltrate a picture from the Mi9. They earned $20,000 USD and 2 Master of Pwn points. The full write-up on this one should prove fascinating.

    Poništi
  6. proslijedio/la je Tweet

    Success! It took two attempts, but the duo were able to demonstrate their exploit of the Q60 television. They're heading back up to the disclosure room to dish the details.

    Poništi
  7. proslijedio/la je Tweet

    Success! The duo successfully demonstrated their exploit against the Show. They're back to the disclosure room to confirm and provide the details.

    Poništi
  8. proslijedio/la je Tweet

    Confirmed! The duo used a Javascript OOB Read bug to exploit the built-in browser to get a bind shell from the TV. They earned $15K and 2 Master of Pwn points to start the contest off with a bang.

    Poništi
  9. proslijedio/la je Tweet

    That's a wrap! Congrats to on winning Master of Pwn. There total was $375,000 (plus a vehicle) for the week. Superb work from this great duo.

    Poništi
  10. proslijedio/la je Tweet

    Confirmed! The duo used a JIT bug in the renderer to win $35,000 and a Model 3. What a great way to kick off the automotive category of .

    Poništi
  11. proslijedio/la je Tweet

    The duo does it again. They used a type confusion in , a race condition in the kernel, then an out-of-bounds write in to go from a browser in a virtual client to executing code on the host OS. They earn $130K plus 13 Master of Pwn points.

    Poništi
  12. proslijedio/la je Tweet

    Wow. Just wow. Starting from a web browser within a virtual client and ending with code execution on the host OS. Now off to the disclosure room for all the details.

    Poništi
  13. proslijedio/la je Tweet

    Confirmed! The duo from used a JIT bug in and an out-of-bounds write in the kernel to earn themselves $50,000 and 5 more Master of Pwn points.

    Poništi
  14. proslijedio/la je Tweet

    Confirmed! leveraged a race condition leading to an out-of-bounds write to escalate from a client to execute code on the host OS. The effort brings them another $70,000 and 7 more Master of Pwn points. Their Day 1 total is $160,000 USD.

    Poništi
  15. proslijedio/la je Tweet

    Confirmed! The team used an integer underflow and a race condition to escape the virtual machine and pop calc on the underlying OS. They earned another $35,000 and 3 points towards Master on Pwn.

    Poništi
  16. proslijedio/la je Tweet

    Confirmed! The team of used an integer overflow in JIT and a heap overflow to escape the sandbox. The successful exploit chain earned them $55,000 and 5 Master of Pwn points.

    Poništi
  17. proslijedio/la je Tweet

    That brings to an end Tokyo 2018! Congrats to team on earning 45 points and being crowned Master of Pwn!

    Poništi
  18. proslijedio/la je Tweet

    Confirmed! The duo used an integer overflow in the JavaScript engine of the web browser to exfiltrate a picture from the phone. They earn $25K and 6 Master of Pwn points.

    Poništi
  19. proslijedio/la je Tweet

    Confirmed! The duo combined a bug in JIT with an Out-Of-Bounds Access to exfiltrate data from the iPhone. In the demo, they grabbed a previously deleted photo. In doing so, they earn themselves $50K and 8 Master of Pwn points.

    Poništi
  20. proslijedio/la je Tweet

    Confirmed! The dynamic duo used a JIT bug followed by an Out-Of-Bounds write to get code execution on the . They earned themselves an additional $60K and 10 more Master of Pwn points.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·