Vitaly Nikolenko

@vnik5287

Security researcher @ DUASYNT. Kernels, hypervisors. PGP: 77B1 FBAC E0FD 2E94 F8AC 2D91 9566 2314 344F 85E8

Sydney, Australia
Joined May 2014

Tweets

You blocked @vnik5287

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @vnik5287

  1. Jan 16

    I'll make my tech report and poc public soon. It was a fun bug affecting most major distributions. one exploit to rule them all w/ all kernel expl mitigation bypasses - no rop chains / hardcoded crap

    Undo
  2. Retweeted
    Jan 7

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Undo
  3. Jan 7
    Undo
  4. Jan 2

    We'll be running our Android kernel exploitation training in Canada (2nd week of April 2020). If there're any other Canadian companies interested in this training during that month, please reach out!

    Undo
  5. 28 Dec 2019

    Advanced ghetto cooling system

    Undo
  6. 29 Oct 2019

    moar fuzzing moar pi

    Undo
  7. 27 Oct 2019

    KASLR/SMEP/SMAP etc

    Undo
  8. 20 Oct 2019

    null-ptr-deref trigger in nfnetlink on upstream 4.4 kernels

    Undo
  9. 5 Oct 2019

    combine with P0 null-page mmap bypass on older kernels / AMD or no-smep systems and you got yourself an easy ret2usr exploit

    Show this thread
    Undo
  10. 5 Oct 2019

    doesn't seem like ubuntu 4.4 LTS kernels want to pull the upstream patch. can still rip <-- 0 with syscall(__NR_clock_gettime, 10, 0)

    Show this thread
    Undo
  11. 6 Sep 2019

    ARM boards collection Odroid, HiKey, Rock64, Firefly

    Undo
  12. Retweeted
    6 Sep 2019

    Get started with Android kernel exploitation with this new training from veteran trainer

    Undo
  13. 1 Sep 2019

    given the recent iOS news, let's all switch to Android ;)

    Undo
  14. 26 Aug 2019

    thanks to slab accounting enabled on a certain cache, a previously non-exploitable bug is now 95+% reliable =)

    Undo
  15. 22 Aug 2019

    I think the linux kernel CVE application process needs to change. Attach a trigger/poc with rip control or some overwrite or gtfo :)

    Undo
  16. Retweeted
    13 Aug 2019

    A nice paper on using Unicorn+AFL to fuzz arbitrary parsers in OS kernel, without requiring kernel source code. Tool:

    Undo
  17. 12 Aug 2019

    still have 1 free sponsored seat (kernel exploitation training) for an undergrad student (Australian universities only). The only catch is you need to meet the minimum course prerequisites

    Undo
  18. 11 Aug 2019
    Undo
  19. Retweeted
    7 Aug 2019

    missed that last year. smart universal heap spray technique to exploit UAF in the linux kernel - by

    Undo
  20. Retweeted
    6 Aug 2019

    Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·