meh

@mehqq_

Pwning in HITCON; Security Researcher of DEVCORE

Taiwan
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @mehqq_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mehqq_

  1. Prikvačeni tweet
    9. kol 2019.

    and I have published the full details of pre-auth RCE on Fortigate SSL VPN! The next one for Pulse Secure SSL VPN is on the way. Stay tuned! Also, thanks everyone for coming!

    Poništi
  2. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  3. proslijedio/la je Tweet
    4. stu 2019.
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    2. ruj 2019.

    The last part of our Attacking SSL VPN series is out - The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! "If you have a nuclear level weapon, when is it ready for public disclosure?"

    Poništi
  5. proslijedio/la je Tweet
    7. kol 2019.

    libFuzzer now works on Windows, I put together a couple notes on getting fuzzers to build with a cmake & Visual Studio project

    Poništi
  6. proslijedio/la je Tweet
    10. kol 2019.

    Twitter disclosed a bug submitted by orange: - Bounty: $20,160

    Poništi
  7. proslijedio/la je Tweet
    9. kol 2019.

    Just drop the RCEs, slides( will fix soon) and blog of and me's and talk - Infiltrating Corporate Intranet Like NSA: Pre-auth RCE on Leading SSL VPNs! Please check that and let us know if you have any questions!

    Poništi
  8. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  9. proslijedio/la je Tweet
    7. kol 2019.

    Oh my god! Best server side bug of 2019, with our CTF and DEVCORE pwning queen

    Poništi
  10. proslijedio/la je Tweet
    17. srp 2019.

    Appetizer for our and talk ! and I will cover more hard-core exploitations, crazy bugs chains and SSL VPN 0days in our incoming presentation! Please look forward to it :P

    Poništi
  11. proslijedio/la je Tweet
    8. srp 2019.
    Poništi
  12. proslijedio/la je Tweet
    6. srp 2019.

    Here is my challenge in WCTF 2019. 
 Hope everyone can learn more windows heap from this challenge. About windows 10 NT heap I only write Chinese version slide, I will release an English version soon.

    Poništi
  13. proslijedio/la je Tweet
    21. lip 2019.

    Is it possible to install IDA Pro without owning installation password? Sure, why not?

    Poništi
  14. proslijedio/la je Tweet
    11. lip 2019.

    Achievement unlocked! Got RCE and the highest bounty on Twitter bug bounty program XD

    Poništi
  15. proslijedio/la je Tweet
    8. svi 2019.

    It's my honor to present at again! and I will show our research and disclose pre-auth RCEs on at least 3 leading SSL VPN vendors!

    Poništi
  16. proslijedio/la je Tweet
    5. svi 2019.

    Nice writeup+(0x41414141) PoC for Mozilla Firefox HTML5 Stream Parsing Use-after-free Vulnerability (CVE-2018-18500) by Yaniv Frank from :

    Poništi
  17. proslijedio/la je Tweet
    26. tra 2019.

    chromacity: Escaping the VM with newlines. My write-up of the challenge by .

    Poništi
  18. proslijedio/la je Tweet
    24. tra 2019.

    Our research team published the Guide to the world of AFL fuzzers

    Poništi
  19. proslijedio/la je Tweet
    17. tra 2019.

    [BLOG] Reverse-engineering Broadcom wireless chipsets by The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to we dont know what is vulnerable...

    Poništi
  20. proslijedio/la je Tweet
    8. tra 2019.

    EXPLOIT for CARPE (DIEM): CVE-2019-0211 Apache Root Privilege Escalation

    Poništi
  21. proslijedio/la je Tweet
    24. ožu 2019.

    Wow! China Airport face recognition systems to help you check your flight status and find the way to your gate. Note I did not input anything, it accurately identified my full flight information from my face!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·