Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @maxpl0it
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @maxpl0it
-
Good to see
@pedrib1337 and@RabbitPro smashing it once again!https://twitter.com/thezdi/status/1219737054399148036 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A compiler choosing to use the CVTTSD2SI instruction to cast a float to an int has made it so my exploit primitives can only r/w up to 0x7fffffff on a 64-bit system. I miss non-optimised code...
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Update: JS Engine: 1x Integer Overflow leading to OOB write 1x Additional BoF
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
12 0days of Christmas progress: Router: 1x Full LAN, 1x BoF. JS Engine: 2x Null Pointer Dereference, 2x BoF, 1x DoS, 1x Memory Leak. Total: 7 So far so good!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
JavaScript fuzzer built and working well. Constantly adding new features.pic.twitter.com/2uPTX262jg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Dove head first into WebKit internals. Found a patched bug without a public exploit and wrote the addrof and fakeobj primitives, as well as the arbitrary R/W primitives. Time to experiment with this in Safari!pic.twitter.com/blrKYs6su7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
For anybody in/around Brighton, this is the place to be!https://twitter.com/the_hacker_lab/status/1197026761445400576 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
For anyone that didn’t catch the Snake exploit at pwn2own, here it is in fullpic.twitter.com/Qqcv9aus15
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
.
@FSecureLabs makes their last attempt at#Pwn2Own Tokyo, this time targeting the#XiaomiMi9.#P2OTokyopic.twitter.com/ALZsk8cKCSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
Confirmed! The
@FSecureLabs crew used an#XSS bug in the NFC component of the#Xiaomi Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
Success! The
@FSecureLabs crew was able to exfiltrate a picture from the#Xiaomi Mi9 handset just by touching it to a rogue NFC tag. The photo transferred slowly, but it definitely worked. They're headed to the disclosure room for verification.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
Confirmed! The
@FSecureLabs team combined a command injection bug along with some insecure settings to achieve their code execution (and Snake-themed light display). The effort earns them $20,000 and one Master of Pwn point.#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
The
@FSecureLabs team targets the TP-Link AC1750 - watch till the end for a fun light show on the router.#P2OTokyopic.twitter.com/gYs01NIqCBHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
maxpl0it proslijedio/la je Tweet
The results for Day One of
@Pwn2Own Tokyo 2019 are here! We awarded $195,000 on our first day. Read all the details and check out the video at https://www.zerodayinitiative.com/blog/2019/11/6/pwn2own-tokyo-2019-day-one-results …#P2OTokyoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
.
@FSecureLabs closes out day 1 of#Pwn2Own targeting the#Xiaomi Mi9 browser.#P2OTokyopic.twitter.com/kRyHh9nQcRHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
Our final attempt of the first day of
#Pwn2Own Tokyo is less than 30 minutes away. The@FSecureLabs team returns to target the#Xiaomi Mi9 in the Web Browser category.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My flashy light script went down well!https://twitter.com/thezdi/status/1191974819178459136 …
0:07Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
maxpl0it proslijedio/la je Tweet
In their first
#Pwn2Own 2019 attempt,@FSecureLabs targets the#TPLink AC1750 Smart WiFi router.#P2OTokyopic.twitter.com/vN3iF25AQNHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.