mj0011

@mj0011sec

Security Researcher at Qihoo360/360Safe, Leader of team 360vulcan. Opinions are my own.

Дата регистрации: декабрь 2010 г.

Твиты

Вы внесли @mj0011sec в черный список

Вы уверены, что хотите видеть эти твиты? Если вы просто просмотрите твиты, @mj0011sec по-прежнему останется в черном списке.

  1. 23 мая

    In case you don’t know: it’s a stable remote code execution demo for CVE-2019-0708 on Windows 7 x64

    Показать эту ветку
    Отменить
  2. 23 мая

    Well, too lazy to pop a calc :)

    Показать эту ветку
    Отменить
  3. 20 мая

    CVE-2019-0708 remote scan tool by 360Vulcan team. Detect the recent RDP bug via RDP packet behavior, without trigger the final bug path(no BSOD or any side effect on the target system), ask for it to scan your network by sending mail to cert at

    Отменить
  4. ретвитнул(а)
    23 янв.

    Researcher reveals details of a recently discovered remote iOS ≤ 12.1.2 on , which Apple patched yesterday with the release of iOS 12.1.3 Just visiting a specially crafted remote webpage via Safari can compromise/jailbreak your device

    Отменить
  5. 3 янв.

    Crew of 360IceSword Lab was rewarded highest MSRC bounty ever via reporting a Hyper-V vulnerability, we may release details next month.

    Отменить
  6. ретвитнул(а)
    5 дек. 2018 г.

    New attacks were discovered against a Russian polyclinic, exploiting a Flash vulnerability (CVE-2018-15982). The vul has been reported to Adobe and the patch was released already.

    Отменить
  7. 28 нояб. 2018 г.

    Surely those are not vulnerabilities, especially the last one, dll side loading for installer? Symc don’t understand/care about vuln and just waste cve numbers to keep you silent

    Отменить
  8. ретвитнул(а)
    25 нояб. 2018 г.
    Отменить
  9. ретвитнул(а)
    16 нояб. 2018 г.

    Will be release information after fix.If you want a research iPhone.Stay 12.1

    Отменить
  10. 16 нояб. 2018 г.

    Watching pwning iOS12 jailbreak on stage was amazing. Too bad that isn’t here with usChengdu Exhibition Center

    Отменить
  11. 16 нояб. 2018 г.
    Отменить
  12. ретвитнул(а)
    16 нояб. 2018 г.

    is the second to make their exploit work on today, so they are rewarded with full points (8) and $40,000.

    Отменить
  13. ретвитнул(а)
    16 нояб. 2018 г.

    Players from has one more successful attempt. They achieved both RCE and sandbox escape, winning full points (10) and $100,000 reward.

    Отменить
  14. ретвитнул(а)
    16 нояб. 2018 г.

    Another Reader was verified to be true. It's an integer overflow bug and helped gain 4 more points and $20,000 award

    Отменить
  15. ретвитнул(а)
    16 нояб. 2018 г.

    Just now, 360Security team had successfully run a logical bug combined with a memory corruption bug on . They become the first in the world to compromise Office system in pwn contest. Bravo!

    Отменить
  16. ретвитнул(а)
    16 нояб. 2018 г.

    team used an integer overflow bug to compromise . They earned 8 points and $80,000.

    Отменить
  17. ретвитнул(а)
    15 нояб. 2018 г.

    Great job! nailed it! They have got their by achieving RCE successfully on Microsoft . It helped them earn 8 points and $80,000!

    Отменить
  18. ретвитнул(а)
    15 нояб. 2018 г.

    has compromised the device with one shot. After the review, the exploit was verified to be a success on Google (RCE only) with an OOB write bug. Congrats to

    Отменить
  19. 26 окт. 2018 г.

    Yeah, definitely, can’t understand why MSFT guys thinking such a slow movement could be “first”.

    Отменить
  20. 26 окт. 2018 г.

    It’s nice to see the WD engine now running inside a sandbox, but you’re not the first AV vendor that make it.

    Отменить

Загрузка может занять некоторое время.

Вероятно, серверы Твиттера перегружены или в их работе произошел кратковременный сбой. Повторите попытку или посетите страницу Статус Твиттера, чтобы узнать более подробную информацию.

    Вам также может понравиться

    ·