Rh0

@rh0_gz

Security Research • Program Analysis • Bugs and Exploits

Digital Cave
Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @rh0_gz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rh0_gz

  1. Prikvačeni tweet
    18. srp 2017.

    Here it is, the 2nd part of my ASM.JS JIT-Spray in Firefox: The Return of the JIT (part 2) (CVE-2017-5400). Enjoy!

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  3. proslijedio/la je Tweet

    To get set for Miami, exploits a SCADA bug submitted by and shows how you can too. See how he pops calc at

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    7. sij

    Today the Superion fuzzer is not anymore open-source on GitHub () so I created an organization called Fuzzers-Archive that aims to collect unmaintained fuzzers to prevent this situation. Open an issue to ask for additions:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  7. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  8. proslijedio/la je Tweet
    24. pro 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    In the 1st of our Top 5 bugs for 2019, takes a look at a sandbox escape in originally submitted to the program by . Read the details at

    Poništi
  10. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  11. proslijedio/la je Tweet

    Start off the week with the 2nd part of 's look into reversing a TP-Link TL-WR841N wireless router. His write-up includes a full exploit & a video demonstration of ZDI-19-992.

    Poništi
  12. proslijedio/la je Tweet

    Correction: Take a deep dive into a winning bug as breaks down an entry used by (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver.

    Poništi
  13. proslijedio/la je Tweet
    17. stu 2019.

    I published the slides of the talk I gave last Friday

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  15. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    30. lis 2019.

    At CCS '19 next month I'll be presenting a paper titled "Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters". More details @

    Poništi
  17. proslijedio/la je Tweet
    28. lis 2019.

    honggfuzz-rs has already found dozens of bugs in Rust packages, the python-hfuzz might help you to do the same with your python code: (from the author of honggfuzz-qemu).

    Poništi
  18. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi
  19. proslijedio/la je Tweet
    22. lis 2019.

    Maybe QL is interesting... Reported by Semmle Security Research Team [$15000][998431] High CVE-2019-13700: Buffer overrun in Blink. [$20000][1001503] High CVE-2019-13699: Use-after-free in media.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    15. lis 2019.

    I just released my slides from "Postscript Pat and His Black and White Hat" Still waiting on fixes from but so far 70+ bugs have been patched.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    10. lis 2019.

    I'd assume PE parsing in the Windows kernel would be well tested but surprisingly no, five such bugs were fixed last Patch Tuesday, all found by fuzzing. They crashed the OS as soon as they'd be written to disk or worst case viewed in Explorer. Details:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·