Posts
2415
Following
585
Followers
1297
A drunken debugger

Heretek of Silent Signal
repeated

Sweet! The InfoSect (@infosectcbr) team successfully exploited the Sonos Era 300 speaker. They head of to the disclosure room to divulge how they did it.

0
2
0
On a related #UX note, which genius decided that in #Akkoma ":D" should automatically translate to 🧬?
0
0
1
If the primary use-case of your app is users typing text, you shouldn't have hotkeys without at least the Ctrl modifier!

Looking at you, #thunderbird #signal !

#ux
0
1
2
repeated

Project Zero Bot

New Project Zero issue:

FASTRPC_ATTR_KEEP_MAP logic bug allows fastrpc_internal_munmap_fd to racily free in-use mappings leading to UAF

https://project-zero.issues.chromium.org/issues/42451725

CVE-2024-49848
1
1
2
repeated

We have another bug collision. The Tenable Group used a stack-based buffer overflow to exploit the Lorex 2K camera, but the bug had already been used in the contest. They still earn $3,750 and 1.5 Master of Pwn points.

0
1
0
repeated

Aargh

Throw the programmers in the sea

30
7
2
repeated

Authenticated! dungdm (@_piers2) with Viettel Cyber Security (@vcslab) used a single Use-After-Free (UAF) bug to exploit the Era 300. The second-round win earns him $30,000 and 6 Master of Pwn points.

0
1
0
repeated

The Synacktiv Team (@Synacktiv) used a combination of 3 different bug to exploit the Ubiquiti AI Bullet. All bugs were unique, so there second round win nets them $15,000 and 3 Master of Pwn points.

0
1
0
repeated

Wow! Ryan Emmons (@the_emmons) and Stephen Fewer (@stephenfewer) of Rapid7 had to rewrite their exploit on the clock, but their second attempt against the Synology DiskStation DS1823xs+ succeeded! They head off to the disclosure room to provide the details.

0
2
0
repeated

Confirmed! @dungnm, @dungdm, & @tunglth of @vcslab used a heap-based buffer overflow to exploit the Synology TC500. IN doing so, they earn $30,000 and 3 Master of Pwn points.

0
1
0
repeated

Whew! On their second attempt, the team from STEALIEN Inc. was able to exploit the Ubiquiti AI Bullet camera. They're off to the disclosure room to explain how they did it.

0
1
0
repeated

Confirmed! The STEALIEN Inc. team used a combination of bugs in their attack chain to exploit the AI Bullet and flash the lights (plus get a root shell). Their work earns them $30,000 and 3 Master of Pwn points.

0
1
0
repeated

Boom! The @Synacktiv ninjas need very little time to exploit the AI Bullet camera. Their flashy demo sends them off to the disclosure room to dish the details.

0
1
0
repeated

Most impressive! @the_emmons and Stephen Fewer @stephenfewer of Rapid7 used an Improper Neutralization of Argument Delimiters bug to exploit the Synology DiskStation DS1823xs+ -- and it works or other Synology devices too! They earn $40,000 and 4 Master of Pwn points.

0
3
0
repeated

Sweet! Jack Dates of RET2 Systems (@ret2systems) made quick work of the Synology DiskStation DS1823xs+ NAS. He's off to disclosure to show us how it's done.

0
1
0
repeated

Boom! ExLuck (@pivik_) finishes Day One with a successful exploit of the AI Bullet camera. He heads off to the final disclosure of the day.

0
1
0
repeated

MemProcFS now supports console text recovery!

Recover text from Cmd and Powershell to Find Evil with MemProcFS super fast memory forensics!

https://github.com/ufrisk/MemProcFS

1
8
0
repeated

Very nice! @dungnm, @dungdm, & @tunglth of @vcslab successfully demonstrated their exploit of the Synology TC500 camera. The move off to the disclosure room to provide the details.

0
1
0
[RSS] 'Reflections on Trusting Trust', but completely by accident this time

https://secret.club/2024/10/21/unnecessarily-exhaustice-rca.html

"An exhaustive analysis of a miscompilation that impacted basically no-one" <3
0
6
6
Show older