-
While it didn’t rain inside I did get to attend
@qwertyoruiopz @#POC2019 pic.twitter.com/FjpiAh5pZU
-
It is raining heavily in Seoul after
#POC2019. pic.twitter.com/vUhccvqAFu
-
-
One of
@qwertyoruiopz’s plans in#POC2019(Nov. 7~8) is to release a forever jailbreak. I hope his plan will go well. http://powerofcommunity.net -
In a few days I will be talking about checkm8 and checkra1n in Seoul at my
#POC2019 talk “The One Weird Trick SecureROM Hates”. -
-
It’s not a real conference if the monitors in the venue’s lobby aren’t showing blue screens by the end
#POC2019 pic.twitter.com/ZjgtxqzSRl
-
Here are my slides from
#POC2019 about exploiting CVE-2018-8611: https://www.nccgroup.trust/globalassets/poc2019/cve_2018_8611_windows_ktm_exploitation_poc2019.pdf … Super fun bug to exploit imo. Most common question was if the inc primitive is really practical. The answer is yes. Use a series of 8 single byte increments at different addr alignments.Prikaži ovu nit -
Fuxking hot noodle challenge in Korea
@qwertyoruiopz#POC2019 pic.twitter.com/40Sv531qQH
-
There are been some questions about my Hyper-V slides so they are now up at https://github.com/FoxHex0ne/Slides … NB: POC will release all the slides in a week or so also. Certainly take a look of all of them - 1st day already had very good ones :)
#poc2019 -
Done with our training , now it’s time for some lit talks
#POC2019 pic.twitter.com/meJB1CAs6j
-
[POCWEEK] Trainer, Prateek and Denish with Offensive mobile reversing and exploitation!
#POC2019 pic.twitter.com/98aqGUW2LE
-
-
Luca Todesco (
@qwertyoruiopz) giving his talk "The One Weird Trick SecureROM Hates” at#POC2019 in Seoul. pic.twitter.com/wE90LqXiFe
-
-
Almost ready for
#checkra1n#POC2019 w/@qwertyoruiopz and#papetebeach musicpic.twitter.com/HceHQdSsGi
-
Looks like
@OnlyTheDuck and@_saph_ are lost in translation
#POC2019 is over, enjoy your stay in Seoul! pic.twitter.com/5St2DhQ7nT
-
-
Windows kernel sandbox escape (not in win32k). One bug to rule Windows 10 1809. Race condition -> Use-after-free -> Memory disclosure -> Increment primitive -> Arbitrary read -> Arbitrary write -> Privilege escalation. Come see amazing
@FidgetingBits present our work at#poc2019 -
Last talk for the
#POC2019! James@tiraniddo is going to present ‘Reimplementing Local RPC .NET and also at the end he’s dropping UAC bypass technique pic.twitter.com/SKQRXSgx4h
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.