maxpl0it

@maxpl0it

Cyber security researcher focusing on low-level exploitation and world domination. Resident pwn tutor at and researcher at

England, United Kingdom
Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @maxpl0it

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @maxpl0it

  1. 22. sij
    Poništi
  2. 29. pro 2019.

    A compiler choosing to use the CVTTSD2SI instruction to cast a float to an int has made it so my exploit primitives can only r/w up to 0x7fffffff on a 64-bit system. I miss non-optimised code...

    Poništi
  3. 28. pro 2019.

    Update: JS Engine: 1x Integer Overflow leading to OOB write 1x Additional BoF

    Prikaži ovu nit
    Poništi
  4. 27. pro 2019.

    12 0days of Christmas progress: Router: 1x Full LAN, 1x BoF. JS Engine: 2x Null Pointer Dereference, 2x BoF, 1x DoS, 1x Memory Leak. Total: 7 So far so good!

    Prikaži ovu nit
    Poništi
  5. 22. pro 2019.

    JavaScript fuzzer built and working well. Constantly adding new features.

    Poništi
  6. 30. stu 2019.

    Dove head first into WebKit internals. Found a patched bug without a public exploit and wrote the addrof and fakeobj primitives, as well as the arbitrary R/W primitives. Time to experiment with this in Safari!

    Poništi
  7. 19. stu 2019.

    For anybody in/around Brighton, this is the place to be!

    Poništi
  8. 7. stu 2019.

    For anyone that didn’t catch the Snake exploit at pwn2own, here it is in full

    Poništi
  9. proslijedio/la je Tweet

    . makes their last attempt at Tokyo, this time targeting the .

    Poništi
  10. proslijedio/la je Tweet

    Confirmed! The crew used an bug in the NFC component of the Mi9 to exfiltrate data just by touching their specially made NFC tag. Their efforts earned $30,000 and 3 more Master of Pwn points.

    Poništi
  11. proslijedio/la je Tweet

    Success! The crew was able to exfiltrate a picture from the Mi9 handset just by touching it to a rogue NFC tag. The photo transferred slowly, but it definitely worked. They're headed to the disclosure room for verification.

    Poništi
  12. proslijedio/la je Tweet

    Confirmed! The team combined a command injection bug along with some insecure settings to achieve their code execution (and Snake-themed light display). The effort earns them $20,000 and one Master of Pwn point.

    Poništi
  13. proslijedio/la je Tweet

    The team targets the TP-Link AC1750 - watch till the end for a fun light show on the router.

    Poništi
  14. 6. stu 2019.

    Anyone at , stop by at 2PM for part 2 of Vegas Lights from the WAN-side of the TP-Link

    Poništi
  15. proslijedio/la je Tweet

    The results for Day One of Tokyo 2019 are here! We awarded $195,000 on our first day. Read all the details and check out the video at

    Poništi
  16. proslijedio/la je Tweet

    . closes out day 1 of targeting the Mi9 browser.

    Poništi
  17. proslijedio/la je Tweet

    Our final attempt of the first day of Tokyo is less than 30 minutes away. The team returns to target the Mi9 in the Web Browser category.

    Poništi
  18. 6. stu 2019.

    My flashy light script went down well!

    Poništi
  19. proslijedio/la je Tweet

    In their first 2019 attempt, targets the AC1750 Smart WiFi router.

    Poništi
  20. 5. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·