Opens profile photo
Follow
Click to Follow j00ru
j00ru//vx
@j00ru
(Mostly) Windows hacker & vulnerability researcher. Google Project Zero.
Switzerlandj00ru.vexillium.orgJoined April 2010

j00ru//vx’s Tweets

Congrats to the winners of this year's Dragon CTF, and the 5⃣ teams that solved my small Linux pwnable "Nim" challenge! As usual, I've uploaded my write-up and exploit on GitHub: github.com/j00ru/ctf-task
Quote Tweet
Dragon CTF 2021 is officially over! Congratulations to the winners: 1. Balsn (@balsnctf) 2. organizers (@0rganizers) 3. More Smoked Leet Chicken (@leetmore) Thank you for playing - GG!
Image
4
59
Faster fuzzing on macOS! If you're using Jackalope/TinyInst on macOS and need -pathch_return_addresses flag, you should now be able to replace it with -generate_unwind and enjoy fuzzing without slowdowns. Thanks for working on this!
Quote Tweet
My second internship at Project Zero brings macOS stack unwinding support in TinyInst (and implicitly in Jackalope). If you fuzz macOS targets that throw exceptions, you can now use the -generate_unwind flag (instead of the -patch_return_addresses flag) for a ~10x speed-up.
Show this thread
50
Fixed this month: CVE-2021-26863, a race condition/use-after-free in win32k.sys demonstrating 's excellent Memory Access Trapping technique in Windows (googleprojectzero.blogspot.com/2021/01/window). It was a fun exercise to do some auditing in search of the specific code pattern.
Quote Tweet
Windows Kernel win32k UAF of the PDEVOBJ object via a race condition in NtGdiGetDeviceCapsAll bugs.chromium.org/p/project-zero
1
193
Really loving this collaboration with font guru , who knows typography inside out, far beyond just the exploitation-specific bits. So much potential for learning from each other 🤓 and finding some cool multi-browser memory corruption bugs in the meantime!
Quote Tweet
With more powerful font formats, it's important to keep browsers and apps safe. @j00ru and I found a #vulnerability in #DirectWrite when processing variable fonts: RCE on visiting a page with a specially crafted font. bugs.chromium.org/p/project-zero msrc.microsoft.com/update-guide/v
1
49
Also check out Perfect Guesser's blog about the task, which has much more detail and better story telling :)
Quote Tweet
We won Dragon CTF 2020! Perfect ⚔️ Guesser is pretty strong :D A bunch of us spent around ~30-40 hours total to solve @j00ru's BitmapManager. Here is a writeup: faraz.faith/2020-11-23-dra
Image
13
Show this thread
GG! I pushed my Windows x64 pwnable binary together with a brief write-up and exploit code on GitHub: github.com/j00ru/ctf-task
Quote Tweet
The Dragon CTF 2020 is now over! Congratulations to the winners: 🥇Perfect ⚔️ Guesser (@pb_ctf + @GuesserSuper) 🥈ALLES! (@allesctf) 🥉hxp (@hxpctf) Thanks to all participating teams, and to our prize sponsor, @SumoLogic! Full scoreboard: ctf.dragonsector.pl/?scoreboard
Show this thread
Image
1
124
Show this thread