Max (@_mxms) 's Twitter Profile
Max

@_mxms

rpisec

ID: 224786268

calendar_today09-12-2010 21:36:37

10,10K Tweet

2,2K Followers

413 Following

RPISEC (@rpisec) 's Twitter Profile Photo

Excited we got 10th at #defconctf. Thanks to Overflow for hosting. Congrats to all the other teams, it was a hard fought battle. See you all next year!

Excited we got 10th at #defconctf. Thanks to <a href="/oooverflow/">Overflow</a> for hosting. Congrats to all the other teams, it was a hard fought battle. See you all next year!
Winnona 💾 (@__winn) 's Twitter Profile Photo

My first technical analysis piece at Recorded Future! TL;DR: 1) Chinese backdoor with a daily 180 second entry-window found in Tibet 2) Qinghua University infrastructure, connected to backdoor, scanning #BeltandRoad partners/ US gov entities denouncing #USChinaTradeWar.

RPISEC (@rpisec) 's Twitter Profile Photo

Came in 1st in CSAW 2018 Quals! Kudos to all who played, it was a tough competition this year! See y'all at finals!

Max (@_mxms) 's Twitter Profile Photo

So what’re we supposed to be doing about the ongoing calls from numbers in our area code? It’s old...

Gabby Roncone 🇺🇦 🇵🇸 (@gabby_roncone) 's Twitter Profile Photo

After Trump was elected, I felt unsafe. I thought that electing a man as president who has assaulted women would normalize that behavior, make assault seem inconsequential to a perpetrator. Right now, I feel worse. It’s normalized, all right.

Brandon Falk (@gamozolabs) 's Twitter Profile Photo

Vectorized Emulation: Hardware accelerated taint tracking at 2 trillion instructions per second gamozolabs.github.io/fuzzing/2018/1…

Real World CTF (@realworldctf) 's Twitter Profile Photo

#RealWorldCTF2018 RPISEC has successfully pwned the Safari browser and spawned a calculator on the victim host at their first attampt during the demostration!

#RealWorldCTF2018 RPISEC has successfully pwned the Safari browser and spawned a calculator on the victim host at their first attampt during the demostration!
Justin Campbell (@metr0) 's Twitter Profile Photo

We've built tools for fuzzing based on emulation of a process snapshot captured via minidump. We're considering open sourcing the tool, and I'm curious about interest level from the rest of the world. (1/3)

Justin Campbell (@metr0) 's Twitter Profile Photo

August Patch Tuesday includes fixes for our internal finds in RDP, including RCE and remote info disclosure, and affecting Win 10 latest. The team successfully built a full exploit chain using some of these, so it's likely someone else will as well. Patch and enable NLA.

Justin Campbell (@metr0) 's Twitter Profile Photo

It's not obvious from the advisory, but the same code runs in RDP client. The issues have been patched in both. This would have allowed a malicious server to compromise a client without any alerting behavior, or a MitM attack with a warning confirmation.

yrp (@yrp604) 's Twitter Profile Photo

The second annual infosec fat bear bracket is here. Let’s gamble on some fat bears for charity. Brackets due ASAP. dpaste.de/OZ1U

Max (@_mxms) 's Twitter Profile Photo

There’s also a format string bug going the opposite direction (when your phones name is %p%p%p...) x.com/fransrosen/sta…

There’s also a format string bug going the opposite direction (when your phones name is %p%p%p...) x.com/fransrosen/sta…
Winnona 💾 (@__winn) 's Twitter Profile Photo

These, combined with recent WIRED reporting on Chinese espionage campaign Operation Skeleton Key targeting the Taiwan Semiconductor Industry (wired.com/story/chinese-…), suggests possibility of an explosion of new homegrown semiconductor companies in the mainland.

yrp (@yrp604) 's Twitter Profile Photo

Do you want to gamble on fat bears for charity? #FatBear2020 is here. Get your brackets in before the 30th! Details here: gist.github.com/yrp604/088bd20…

Do you want to gamble on fat bears for charity? #FatBear2020 is here. Get your brackets in before the 30th!

Details here: gist.github.com/yrp604/088bd20…
Justin Campbell (@metr0) 's Twitter Profile Photo

Fortunately this http.sys bug was an internal find by our team. This one thanks to Max, Stefan Blair and everyone who contributes to our tooling and automation.