Hanqing Zhao

@hankein95

Member of Tea Deliverers CTF Team; System & Security

Atlanta, GA
Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @hankein95

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hankein95

  1. Prikvačeni tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  2. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  3. 27. pro 2019.

    Our presentation on VMware Virtual Machine Escape () is in process. Please watch it in room BORG or on

    Poništi
  4. 15. pro 2019.
    Poništi
  5. 8. pro 2019.

    Congrats to for winning the final. I think the number of ’s championships is more than the number of CTFs I’ve played. See you guys in next year’s .

    Poništi
  6. 3. pro 2019.
    Poništi
  7. 12. stu 2019.

    Got accepted! and I will present ESXi security internals at . We will introduce more ESXi fundamentals, sharing insights into offensive research of VMware's virtual machines.

    Poništi
  8. proslijedio/la je Tweet
    12. stu 2019.

    VMware just repairs the vulnerability I use in my exploit :(

    Poništi
  9. 5. ruj 2019.

    I want to know the differences between the IL and AST. Why fuzzing on IL is effective? Why we can not do some similar stuff on AST?

    Poništi
  10. proslijedio/la je Tweet
    3. ruj 2019.

    2019 Real World CTF website and page is up. 🥳🥳🥳Our online qualification round begins in 10 days, and our Real World CTF Final finally back to Beijing this year. See you soon in Beijing, China. :P

    Poništi
  11. 18. kol 2019.
    Poništi
  12. 12. kol 2019.

    When I get back to Atlanta, I’ll exert myself to make my challenges much better 😂

    Prikaži ovu nit
    Poništi
  13. 12. kol 2019.
    Prikaži ovu nit
    Poništi
  14. 23. srp 2019.
    Poništi
  15. 15. srp 2019.

    sorry for the typo. It’s

    Prikaži ovu nit
    Poništi
  16. 15. srp 2019.

    Please check our new blog "Exploiting TurboFan Through Bounds Check Elimination". … BTW, if you are interested in real-world style challenges, please keep the focus on of this year. 😉

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    Fourth speaker @ Zer0con2019 Wen Xu() and Soyeon Park from Georgia Tech are giving a talk about “Comprehensive Browser Fuzzing: from DOM to JS Cheer up for them!

    Poništi
  18. proslijedio/la je Tweet
    1. ožu 2019.

    macOS Safari exploit demo, developed with All the bugs have been reported.

    Poništi
  19. proslijedio/la je Tweet
    9. sij 2019.

    Check our group's work: "Fuzzing File Systems via Two-Dimensional Input Space Exploration": We will open source soon. Thanks to for inspiring this work.

    Poništi
  20. proslijedio/la je Tweet
    24. srp 2018.

    Here's an updated version of async_wake with a more usable KDP-based kernel debugger:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·