saspect488's profile picture. trying to break stuff, opinions my own. ʚଓ

saspect

@saspect488

trying to break stuff, opinions my own. ʚଓ

saspect reposted

.@TashitaSoftSec 's mission is to revolutionise how security research is performed, by developing the most advanced vulnerability research frameworks. Join us and become part of an epic adventure! Career opportunities: tashita.net/careers/ DMs are open!


My mates @ckrielle and @l34n_d3v just dropped i0.rs, a new blog focused on high-quality security research. If you're into novel technical content definitely check it out.

Hello everyone, @l34n_d3v and I are dropping our new blog i0.rs, where high-quality infosec articles will be posted. The blog is open to submissions from everyone. The criteria for accepting an article are technical depth, impact, and novelty



saspect reposted

Hello everyone, @l34n_d3v and I are dropping our new blog i0.rs, where high-quality infosec articles will be posted. The blog is open to submissions from everyone. The criteria for accepting an article are technical depth, impact, and novelty


saspect reposted

Make CSAW EU CTF Finals onsite again. Also sasAPT sasAPT sasAPT

🥇🥈🥉 CSAW’24 Europe : Congratulations to the CTF Finalists ! We're delighted to announce the 14 finalist teams in the Capture the Flag competition. 🍀 Good luck to all for the final!! The final 36-hour competition will be held online.

CsawEurope's tweet image. 🥇🥈🥉 CSAW’24 Europe : Congratulations to the CTF Finalists !
We're delighted to announce the 14 finalist teams in the Capture the Flag competition.
🍀 Good luck to all for the final!!
The final 36-hour competition will be held online.


saspect reposted

Even though they missed out on registration, @aahmad097, @Rembown, @m40282845, @0xShad3, @thegrandpew (@ht3labs) gave quite the demonstration of their exploit prowess against the QNAP TS-464 & the Synology BeeStation. We look forward to seeing their work in future competitions


saspect reposted

@thezdi We registered for p2o but didn’t hear our name, what happened ??


saspect reposted

Looks like @HexRaysSA is releasing IDA 9 and drastically increasing the prices. My current IDA update is 3k EUR the new IDA 9 equivalent will be 5k EUR. 😂😂😂


saspect reposted

The past year has been amazing. From marriage, to Pwn2Own to a Pwnie Award, I'm so grateful. I'm using the money I've won from hacking competitions, bounties, & RB for two ppl to travel & attend Hexacon, the premier offensive security con in Paris, France. forms.gle/zt9RaR7EEvTxWG…


saspect reposted

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

phrack's tweet image. The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…

saspect reposted

I just released the blog explaining how I leveraged CVE-2022-22265 in the Samsung npu driver. Double free to achieve UAF over signalfd + cross cache + Dirty Page Table + code inject into libbase.so for execution by init. Hope you can enjoy it soez.github.io/posts/CVE-2022…


saspect reposted

What a weekend it was! We are super proud of the results. It was great playing alongside top-notch players in the CTF community! 🥳

Shout-out to @GoogleVRP for yet another amazing competition and of course, to our awesome friends from @0tolerance_ctf & @redrocket_ctf . Cya in Malaga!

WreckTheLine's tweet image. Shout-out to @GoogleVRP for yet another amazing competition and of course, to our awesome friends from @0tolerance_ctf & @redrocket_ctf . Cya in Malaga!


saspect reposted

POC for CVE-2024-27804 Wanted to share it after finishing a blogpost. but decided to share it. r00tkitsmm.github.io/fuzzing/2024/0…

I reported CVE-2024-27804, an iOS/macOS kernel vulnerability that leads to the execution of arbitrary code with kernel privileges. Will publish the POC soon. support.apple.com/en-gb/HT214101



saspect reposted

In a new guest blog, #Pwn2Own winner @_manfp details CVE-2024-2887 - a bug he used to exploit both #Chrome and #Edge during the contest on his way to winning Master of Pwn. He breaks down the root cause and shows how he exploited it. Read the details at zerodayinitiative.com/blog/2024/5/2/…


saspect reposted

A couple of weeks ago our team participated in @CSCGreece, an onsite CTF in Greece. Our team crushed it🏆! We hope to see more onsite events like that in Greece. Kudos to everyone involved!

0tolerance_ctf's tweet image. A couple of weeks ago our team participated in @CSCGreece, an onsite CTF in Greece. Our team crushed it🏆! We hope to see more onsite events like that  in Greece.
Kudos to everyone involved!
0tolerance_ctf's tweet image. A couple of weeks ago our team participated in @CSCGreece, an onsite CTF in Greece. Our team crushed it🏆! We hope to see more onsite events like that  in Greece.
Kudos to everyone involved!
0tolerance_ctf's tweet image. A couple of weeks ago our team participated in @CSCGreece, an onsite CTF in Greece. Our team crushed it🏆! We hope to see more onsite events like that  in Greece.
Kudos to everyone involved!

saspect reposted

In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kernel code execution from an untrusted app on a Pixel 8 with MTE enabled. github.blog/2024-03-18-gai…


saspect reposted

Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE :…


saspect reposted

Last year I discovered multiple bugs in virtio-net for VirtualBox (CVE-2023-22098, CVE-2023-22099, CVE-2023-22100) and wrote a 100% reliable VM escape using an out-of-bounds write (with ASLR defeat). Published the exploit code: github.com/google/securit…


🔥👏

I saw the CFP 2 days before the deadline, but still managed to cook something up. I am very happy that my article "Wrapping GDB with Python to Easily Capture Flags" is in PagedOut! It's not a novel CTF technique, but I hope I can spread it more with this publication.



Loading...

Something went wrong.


Something went wrong.