William Bowling

@wcbowling

Software Developer for Biteable, a.k.a vakzz when doing CTFs @

Tasmania, Australia
Vrijeme pridruživanja: srpanj 2013.

Tweetovi

Blokirali ste korisnika/cu @wcbowling

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wcbowling

  1. Prikvačeni tweet
    11. srp 2019.

    So yes, there was an RCE in the hidden zoom web server... Great work by for the initial research, for more details on if you're affected see CVE-2019-13567

    Poništi
  2. proslijedio/la je Tweet
    18. pro 2019.

    GitLab disclosed a bug submitted by vakzz: - Bounty: $12,000

    Poništi
  3. 14. lis 2019.
    Poništi
  4. 29. kol 2019.

    Here are the details on the Zoom RCE (CVE-2019-13567) that we sent to mitre, worked on the latest (and last) ZoomOpener which had the host check and signature verification

    Poništi
  5. proslijedio/la je Tweet
    15. srp 2019.

    RingCentral (and Zhumu, and likely all of Zoom’s white labels) are vulnerable to another, slightly different, RCE. They are not automatically removed by Apple. CVE-2019-13576 & CVE-2019-13586 Follow these instructions to protect yourself:

    Prikaži ovu nit
    Poništi
  6. 25. lip 2019.

    Here's my writeup for Secure Boot from , was a fun one 😀 

    Poništi
  7. 24. lip 2019.

    Congrats to the winners of , was a great competition! Here’s my writeup for JIT (we got first blood 😀)

    Poništi
  8. proslijedio/la je Tweet

    Grab snacks and energy drinks, the is approaching fast! Team registration and Beginner's Quest will open tomorrow Friday 21 June 12:00 GMT at . We will start releasing the main CTF challenges on Sat 22 June 00:01 GMT. Have fun!

    Poništi
  9. proslijedio/la je Tweet
    14. lip 2019.

    All the balls are the same color — and that color is *brown*!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    You raided a journalist because they informed the public about secret plans to spy on them. Over a year ago. And you waited until after the election to do it.

    Poništi
  11. 17. svi 2019.

    ZombieLoad (CVE-2018-12130) and Fallout (CVE-2018-12126) POCs to break KASLR, taken pretty much straight from the papers.

    Poništi
  12. proslijedio/la je Tweet
    14. svi 2019.

    Having trouble keeping all the CPU vulns that dropped today straight? Understandable. There's a lot. This is going to be a thread.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. svi 2019.

    Just posted my writeup for INS'Hack 2019's "Bypasses Everywhere" XSS challenge - Bypassing CSP and Chrome's XSS auditor with Iframes -

    Prikaži ovu nit
    Poništi
  14. 29. ožu 2019.

    Just received my coin from T19 ctf, looks awesome!

    Poništi
  15. 19. ožu 2019.

    My writeup for p4fmt from CONFidence teaser by , was a great kernel challenge!

    Poništi
  16. proslijedio/la je Tweet

    CVE-2019-9824 QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables: Posted by P J P on Mar 18 Hello, An information leakage issue was found in the SLiRP networking implementation of the QEMU emulator. It occurs in tcp_emu()…

    Poništi
  17. 8. ožu 2019.
    Poništi
  18. proslijedio/la je Tweet
    4. ožu 2019.

    Big thanks to for throwing a great CTF. Third place for OpenToAll! congrats to DCUA and Perfect Blue for 1st and 2nd (respectively). Last hour was ridiculous.

    Poništi
  19. 13. velj 2019.

    Since the embargoed exploit code for CVE-2019-5736 has now been released, here is the Dockerfile used in the above demo

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    12. velj 2019.

    Our very own and writing about the process they undertook to discover and exploit CVE-2019-5736:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·