_gauravb_'s profile picture. vuln excavationist | Pwn2Own (partial) winner 😜

Gaurav Baruah

@_gauravb_

vuln excavationist | Pwn2Own (partial) winner 😜

PSA: Beware of paying any money to crack.sh. Their password cracking queue is stuck and no one bothers responding to emails or tweets 🤦‍♂️ I have been trying for a week to contact them and finally had to resort to initiating a chargeback on my card today.


Never quite believed the phrase “third time’s a charm” until yesterday while watching the p2o draw. Got picked first in my category this year after participating for the past 2 yrs and having vuln collisions each time😆


another year, another collision 😂 #VulnCollisionLife

Another partial collision. One of the bugs used by @_gauravb_ to gain code execution on the #Cisco RV340 was previously known. He still earns $22,500 and 2.5 Master of Pwn points. #Pwn2Own #P2OAustin



Gaurav Baruah reposted

We’re still growing, and looking for more elite researchers. Check out the job openings at exodusintel.com/careers.html


Gaurav Baruah reposted

If you're at zer0con this week, stop by and check out @externalist talk on exploiting Magellan bug on Chrome


Gaurav Baruah reposted

@_2can of our Nday team takes a closer look at the recently patched Chrome vulnerability spotted in the wild (exploit included) blog.exodusintel.com/2019/02/20/cve…


Gaurav Baruah reposted

Here's a high level outline of what I'll be teaching. My goal is to convey the thought process behind identifying vulnerabilities within embedded devices and developing exploits for them. Device 1 - MIPS (Real-time OS) [Outline Pending] Device 2 - ARMv7 (Linux)

b1ack0wl's tweet image. Here's a high level outline of what I'll be teaching. My goal is to convey the thought process behind identifying vulnerabilities within embedded devices and developing exploits for them.

Device 1 - MIPS (Real-time OS) [Outline Pending]
Device 2 - ARMv7 (Linux)

Gaurav Baruah reposted

After a good amount of feedback and requests, we have decided to move our Intro to Embedded System training back to Feb 18, 2019. We have also extended the early ticket discount to reflect the new dates. blog.exodusintel.com/2018/09/05/int…


Gaurav Baruah reposted

“Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” – Martin Fowler


Gaurav Baruah reposted

Our Nday team has uncovered a failed patch in @McAfee TrueKey. It has been reported and a patch was attempted. Read more: blog.exodusintel.com/?p=1280


Loading...

Something went wrong.


Something went wrong.