Posts
2452
Following
555
Followers
1266
A drunken debugger

Heretek of Silent Signal
repeated

Wow! Ryan Emmons (@the_emmons) and Stephen Fewer (@stephenfewer) of Rapid7 had to rewrite their exploit on the clock, but their second attempt against the Synology DiskStation DS1823xs+ succeeded! They head off to the disclosure room to provide the details.

0
2
0
repeated

Confirmed! @dungnm, @dungdm, & @tunglth of @vcslab used a heap-based buffer overflow to exploit the Synology TC500. IN doing so, they earn $30,000 and 3 Master of Pwn points.

0
1
0
repeated

Whew! On their second attempt, the team from STEALIEN Inc. was able to exploit the Ubiquiti AI Bullet camera. They're off to the disclosure room to explain how they did it.

0
1
0
repeated

Confirmed! The STEALIEN Inc. team used a combination of bugs in their attack chain to exploit the AI Bullet and flash the lights (plus get a root shell). Their work earns them $30,000 and 3 Master of Pwn points.

0
1
0
repeated

Boom! The @Synacktiv ninjas need very little time to exploit the AI Bullet camera. Their flashy demo sends them off to the disclosure room to dish the details.

0
1
0
repeated

Most impressive! @the_emmons and Stephen Fewer @stephenfewer of Rapid7 used an Improper Neutralization of Argument Delimiters bug to exploit the Synology DiskStation DS1823xs+ -- and it works or other Synology devices too! They earn $40,000 and 4 Master of Pwn points.

0
3
0
repeated

Sweet! Jack Dates of RET2 Systems (@ret2systems) made quick work of the Synology DiskStation DS1823xs+ NAS. He's off to disclosure to show us how it's done.

0
1
0
repeated

Boom! ExLuck (@pivik_) finishes Day One with a successful exploit of the AI Bullet camera. He heads off to the final disclosure of the day.

0
1
0
repeated

MemProcFS now supports console text recovery!

Recover text from Cmd and Powershell to Find Evil with MemProcFS super fast memory forensics!

https://github.com/ufrisk/MemProcFS

1
8
0
repeated

Very nice! @dungnm, @dungdm, & @tunglth of @vcslab successfully demonstrated their exploit of the Synology TC500 camera. The move off to the disclosure room to provide the details.

0
1
0
[RSS] 'Reflections on Trusting Trust', but completely by accident this time

https://secret.club/2024/10/21/unnecessarily-exhaustice-rca.html

"An exhaustive analysis of a miscompilation that impacted basically no-one" <3
0
6
6
repeated

Nice! The DEVCORE Research Team (@d3vc0r3) wasted no time exploited the TrueNAS Mini X NAS device. They head off to the disclosure room to dish the deets.

0
1
0
repeated

ATT&CKCon 5.0 is officially on. Check it out via livestream for free: https://www.mitre.org/events/attackcon-5

0
3
0
repeated

The Archive is back! (In read only mode). Get to the things you love, and we will continue our quest to be dependable, clean up the mess left behind, and be there for you.

https://archive.org

3
23
1
repeated

Eniko | Kitsune Tails out now!

Do we need a project for archiving the internet archive?

9
4
0
repeated

Google kernelCTF LTS/COS 0-day WIN!

Successfully exploited an extremely complex race condition 0-day vuln on two instances without using namespaces 🎉

work with @_qwerty_po

1
3
0
repeated

Success! It took nearly the entire allotted time, but the Viettel Cyber Security (@vcslab) team was abot to complete their SOHO SMASHUP, going from the QNAP QHora-322 to the TrueNAS Mini X. They are off to the disclosure room with the details.

0
1
0
repeated

Boom! ExLuck (@ExLuck99) of ANHTUD successfully exploited the QNAP TS-464 NAS device. He's off to the disclosure room with the details.

0
1
0
repeated

How awesome is this birthday cake? Real LEDs embedded in it and controlled from an ! Multiple modes, including Kill The Bit game!

Fantastic work by the hugely talented @shieladixon ♥️

4
3
0
Show older