j00ru//vx

@j00ru

Windows hacker & vulnerability researcher. Google Project Zero.

Poland
Joined April 2010

Tweets

You blocked @j00ru

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @j00ru

  1. Jan 30

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Undo
  2. Retweeted
    Jan 20

    If you're into programming, hacking, retro computers, electronics, etc check out our free magazine: 💾 Issues #1 and #2 are already out! For Issue #3 we're looking for: - Articles and Art! - Free community ads! - And sponsorship ads! Deadline: 20.02.20

    Show this thread
    Undo
  3. Jan 13

    Anyone know if it's possible to have IDA load debug symbols embedded in the "stabs" format (), in a clean install or with some plugin? Or any other static analysis tools that support stabs other than objdump?

    Undo
  4. Retweeted
    Jan 9

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Show this thread
    Undo
  5. Retweeted
    Jan 7

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Undo
  6. Retweeted
    Jan 2

    2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

    CTFTime scoreboard screenshot:
1st place: Dragon Sector (Poland)
2nd place: Balsn (Taiwan)
3rd place: Plaid Parliament of Pwning (USA)
    Undo
  7. Retweeted
    9 Dec 2019

    We are hiring! Work on extremely interesting tech in a small and friendly team. Have big impact. Reduce computational waste, save customers money, reduce energy waste/CO2, and have fun while doing so. Full job description here:

    Undo
  8. Retweeted
    17 Dec 2019

    Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244

    Undo
  9. Retweeted
    21 Nov 2019

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Undo
  10. Retweeted
    20 Nov 2019

    Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles

    Undo
  11. 18 Nov 2019

    The BabyKernel Windows exploitation challenge from last week's is up on GitHub:

    Undo
  12. 17 Nov 2019

    I'm impressed by the detailed analysis of the sample minimization process, root cause and fix of one of the October Windows kernel PE parsing bugs, performed with REVEN. Great read! 🤓

    Undo
  13. Retweeted
    16 Nov 2019

    Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!

    Undo
  14. Retweeted
    12 Nov 2019

    Paged Out! #2 ETA: This Friday.

    Undo
  15. 10 Oct 2019

    The effort was inspired by Fortinet's CVE-2018-1040 from last year. Original write-up: . Thanks!

    Show this thread
    Undo
  16. 10 Oct 2019

    I'd assume PE parsing in the Windows kernel would be well tested but surprisingly no, five such bugs were fixed last Patch Tuesday, all found by fuzzing. They crashed the OS as soon as they'd be written to disk or worst case viewed in Explorer. Details:

    Show this thread
    Undo
  17. 8 Oct 2019
    Show this thread
    Undo
  18. 8 Oct 2019

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Show this thread
    Undo
  19. 25 Sep 2019

    This has bitten me twice now, so let me reiterate: if you do fuzzing on Windows with Application Verifier (PageHeap etc.), disable logging first: appverif -logtofile disable otherwise your target will start for seconds and then minutes due to linear search of a log file name 😬

    Undo
  20. 23 Sep 2019

    Congrats to meltdown, Bushwhackers, Tasteless, p4, !SpamAndHex, PPP, Shellphish, pwndevils and Never Stop Exploiting for solving it in time, and of course to everyone at the top of the scoreboard😀

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·