Ian Lee

@willwayy0

Love Browser Exploitation, POC, and Zer0Con

Seoul, Republic of Korea  
Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @willwayy0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @willwayy0

  1. proslijedio/la je Tweet
    prije 17 sati

    WCTF 2019 - LazyFragmentationHeap Korean writeup I tried to learn about windows heap internals with this challenge

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  3. proslijedio/la je Tweet
    3. sij

    Zer0Con2020 [Call for Papers] is open for top-notch speakers! Zer0con focuses on finding, analyzing, and exploiting vulnerability. Please refer to our website for more info! CFP deadline: 25th Feb, 2020 Zer0Con: 16~17 April, 2020

    Poništi
  4. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  5. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    13. pro 2019.

    As I've recently gotten into browser exploitation, I thought I'd solve and do a writeup for a CTF challenge from earlier this year that really doesn't have any detailed writeups. Hope someone finds my writeup for *CTF 2019 oob-v8 useful! DMs are open.

    Poništi
  8. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    6. pro 2019.

    A while back I did a quick fuzzing exercise on Google Chrome <portal> element

    Poništi
  11. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  12. proslijedio/la je Tweet
    4. pro 2019.

    Great talk by and on fuzzing at scale with ClusterFuzz.

    Poništi
  13. proslijedio/la je Tweet
    2. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    1. pro 2019.

    📺 New Tutorial Video 📺 Intro to scripting with Python and 🐍 Learn how to automate resolving the dynamic API calls ⚙️

    Poništi
  15. proslijedio/la je Tweet
    23. stu 2019.

    Sourcetrail : a free , cross-platform and open-source interactive source(code) explorer : cc

    Poništi
  16. 8. stu 2019.

    Fuxking hot noodle challenge in Korea 😆

    Poništi
  17. proslijedio/la je Tweet
    7. stu 2019.

    There are been some questions about my Hyper-V slides so they are now up at NB: POC will release all the slides in a week or so also. Certainly take a look of all of them - 1st day already had very good ones :)

    Poništi
  18. proslijedio/la je Tweet
    1. stu 2019.

    In a few days I will be talking about checkm8 and checkra1n in Seoul at my talk “The One Weird Trick SecureROM Hates”.

    Poništi
  19. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·