Joshua J. Drake

@jduck

Security Research, CTFer, Pwngrammer, Reverser, and former Skateboarder/BBoy. bitcoin: 1HbcsSQK32anaiNeHS7txD4DrEkH93Hnqr

Austin, TX
Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @jduck

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jduck

  1. proslijedio/la je Tweet
    11. lis 2019.

    People were asking which of our reported vulns were fixed in tcpdump 4.9.3. List below, thanks to and for the great hax! CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2018-16301 CVE-2018-16230 CVE-2018-16452 CVE-2018-16300

    Poništi
  2. proslijedio/la je Tweet
    9. ruj 2019.

    Patch-gapping in practice: Google Chrome edition (by of our nDay team)

    Poništi
  3. proslijedio/la je Tweet
    8. srp 2019.

    We’re still growing, and looking for more elite researchers. Check out the job openings at

    Poništi
  4. proslijedio/la je Tweet
    28. svi 2019.
    Poništi
  5. proslijedio/la je Tweet
    27. svi 2019.

    It's another Humble Bundle and you're going to love this one! Please RT. You're welcome :)

    Poništi
  6. 26. svi 2019.

    Something fun to create / look at might be vuln root cause infographics. I dunno

    Poništi
  7. proslijedio/la je Tweet
    25. svi 2019.
    Odgovor korisnicima

    I would agree that objectively everything is insecure if the definition is whether it is exploitable in the future. In reality, security is relative to the capability and intent of your adversaries.

    Poništi
  8. proslijedio/la je Tweet
    24. svi 2019.

    Austin hackers, let's gather for a night of lectures, libations, and BBQ on Wednesday June 5th. Thanks to our corporate sponsors tagged in the photo for fueling the evening. Limited capacity, register at: Looking forward to catching up with everyone.

    , , i još njih 4
    Poništi
  9. proslijedio/la je Tweet
    20. svi 2019.

    Check out part 1 of the blog post by for his winning Pwn2Own entry on Edge (sbx part2 coming next)

    Poništi
  10. proslijedio/la je Tweet
    17. svi 2019.

    Suspected Bug Collision: iOS/OSX Content Filter Kernel UAF Analysis + POC

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. svi 2019.
    Poništi
  12. proslijedio/la je Tweet
    17. svi 2019.

    . of our Nday team exploits the recently patched CVE-2019-0808 win32k bug to escape the chrome sandbox

    Poništi
  13. 9. svi 2019.

    After all this time, yet more special handling in Android's design/security architecture to deal with Stagefright. I'm surprised, but only a little ;-)

    Poništi
  14. 7. svi 2019.

    Also, -- Mr. Wheeler says hello

    Poništi
  15. 7. svi 2019.

    Well, was awesome this year. A bit more diluted than I remember but still lots of amazing people. Great seeing old friends and meeting new ones. Until next time, fellow hackers.

    Poništi
  16. 12. tra 2019.

    I'll be at this year. Who knows, maybe Banana Cognac....

    Poništi
  17. proslijedio/la je Tweet
    11. tra 2019.

    If you're at zer0con this week, stop by and check out talk on exploiting Magellan bug on Chrome

    Poništi
  18. proslijedio/la je Tweet
    23. sij 2019.

    of our Nday Team details exploiting the recently patched Magellan bug on 64-bit Chrome Desktop (exploit included)

    Poništi
  19. proslijedio/la je Tweet
    16. lis 2018.
    Poništi
  20. proslijedio/la je Tweet
    28. kol 2018.

    The bladeRF 2.0 micro is in stock and shipping! 47MHz to 6GHz, 61.44MHz sampling rate, 2x2 MIMO, and more! For more information, visit the official page

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·