rootack

@rootack

POC conference, Belluminar, Zer0Con
Vrijeme pridruživanja: srpanj 2008.

Tweetovi

Blokirali ste korisnika/cu @rootack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rootack

  1. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 Day 3: It begins

    Poništi
  2. proslijedio/la je Tweet
    27. stu 2019.

    Solving binary-only CTF challenges with honggfuzz and qemu binary instrumentation -

    Poništi
  3. proslijedio/la je Tweet
    6. lis 2019.

    Want to find out how to exploit Just-In-Time compiler vulnerabilities like this? Join me at my OffensiveCon training in February and become an blackbelt in Browser Jiu JIT-su:

    Poništi
  4. proslijedio/la je Tweet
    8. lis 2019.
    Poništi
  5. proslijedio/la je Tweet
    7. lis 2019.

    XNU: remote double-free via data race in IPComp input path

    Poništi
  6. proslijedio/la je Tweet
    7. lis 2019.

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Poništi
  7. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    3. lis 2019.

    Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    CFP deadline date: 10th Oct * We have about 9 more days to deadline We are looking for hardcores in Android(especially Samsung and Huawei related), AI, SCADA and Hardware And yes indeed, if you have other outstanding research, do not hesitate to send us!

    Poništi
  10. proslijedio/la je Tweet
    29. svi 2019.

    MOSEC2019 has just begun! Our first speaker of the day, we have JingLi Hao(QIhoo360) presenting ‘The birdman and Cospas-Sarsat Satellites’

    Poništi
  11. proslijedio/la je Tweet
    27. svi 2019.

    We just published the slides for the TEE presentation gave at and , and kicking off part 1/4 of a blog post series about this research.

    Poništi
  12. proslijedio/la je Tweet

    Our colleague, Suhee just got accepted to BlackHat Talk! Congrats Suhee! She is going to talk about "Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan" See you all there!

    Poništi
  13. proslijedio/la je Tweet
    9. velj 2019.

    Yet, another JB for iOS 12...Maybe it does not work on A12 since we cannot use ROP in userspace right now... what if BOP all the things? 🤔

    Poništi
  14. proslijedio/la je Tweet
    28. sij 2019.

    Yet another great article that briefly explains about some of the security features introduced in Intel processors like WP, NXE/XD, MPX, SGX, Protection keys. I didn't aware of most of them.

    Poništi
  15. proslijedio/la je Tweet
    17. pro 2018.

    iOS 12.1 PoC exploit now available:

    Poništi
  16. proslijedio/la je Tweet

    Zer0Con2019 [Call for Papers] is now open for top-notch speakers! Zer0con focuses on finding, analyzing, and exploiting vulnerability. Please refer to our website for more info! CFP deadline: 25th Feb, 2019

    Poništi
  17. proslijedio/la je Tweet

    Belluminar Warriors! Apparently Organizers of Belluminar will wear those.. Still testing challenges and with beers aside

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    21. lip 2018.

    Vulcan team showed remote jailbreak demo iOS 12 beta. Vulcan team used Safari + kernel bug for the jailbreak.

    Poništi
  20. proslijedio/la je Tweet

    MOSEC is on! Come on in and see us if you are here at Shanghai!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·