Nox
@mrnox_
Casual CTF player at @id10t_ctf. Independent Vulnerability REsearcher, formerly @Immunityinc and @CoreSecurity.
ID: 226959303
http://blog.rop.la 15-12-2010 14:51:06
10,10K Tweet
1,1K Followers
697 Following
Thanks to these articles from Samuel Groß(Samuel Groß), I started studying browsers vr/xd and this was basically the starting point: phrack.org/issues/70/3#ar… phrack.org/issues/70/9#ar…
Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k Article by Crusaders of Rust about exploiting a UAF in the network packet scheduler. Researchers manipulated red-black trees to achieve a page-level UAF and escalate privileges. syst3mfailure.io/rbtree-family-…
Quantum ROP. This is really cool technique and needs more attention. By Yoav Shifman and Yahav Rahom. phrack.org/issues/72/12_md
In 3 weeks, Dylan Tran and I will be giving our talk, "COM to the Darkside" at Munich Cyber Tactics, Techniques and Procedures in the Offensive Track. The talk will focus on 90's MCP technology and will deep dive into some fun (D)COM topics. See you there!
🔥 So, at DEF CON there was a talk about deobfuscation: VMDragonSlayer by Agostino Panico @localhost. The author released the code and there's clearly huge amounts of AI slop.🤖 Now, WE WENT TO THE TALK and spoke with the speaker after the talk. 🧵