Freddo Espresso 🧊
@2039user
A bit of CTFs, Fuzzing, Exploits, Bug Bounties, Conferences, Go, Traveling and Running. Thus, a byte.
ID: 1350483544729145345
16-01-2021 16:42:31
96 Tweet
70 Takipçi
308 Takip Edilen
Mark Griffin Interrupt Labs Vigilant Labs bugcrowd 1️⃣ Beacon Prism 🛡️💥 Alan Cao (alan) & William Tan (Ninja3047 ) demo how to exploit unauthenticated firmware downgrades to compromise a BitDefender Box 1. 2️⃣ Cloudy Wrench ☁️🔧 Alan Cao (alan) & William Tan (Ninja3047 ) at it again - uncovering legacy
There should be some kind of special award for a conference that runs for the first time, on such high quality, is so well-organized, brings so many new ideas on the table and does all of that while on a power outage! Amazing work people DistrictCon ❤️
New blogpost! Want to see how we exploited Synology Inc. network-attached-storage devices at Pwn2Own Ireland? RCE to root via out-of-bounds NULL-byte writes, click the embed for a fun little writeup of CVE-2024-10442 🔎🎉 blog.ret2.io/2025/04/23/pwn…