Claudia d’Antoine (@secretgardenctf) 's Twitter Profile
Claudia d’Antoine

@secretgardenctf

Security @margin_research

ID: 1785810107957153793

calendar_today01-05-2024 23:15:50

27 Tweet

440 Takipçi

108 Takip Edilen

Qualys (@qualys) 's Twitter Profile Photo

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…

Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

This bug is not really a regression because mdowd, who we all know is from the future, clearly knew about it before traveling back in time to 2006 to exploit it the first time (in our timeline). It's only a regression in this timeline. qualys.com/2024/07/01/cve…

Margin Research (@margin_research) 's Twitter Profile Photo

Interested in messaging app research on iOS? Follow along with ian dupont in our blog series "You Can't Spell WebRTC without RCE!" Part 1 dives into Signal’s WebRTC calling library and injects bugs to facilitate deeper research: margin.re/2024/07/you-ca…

Pwnie Awards (@pwnieawards) 's Twitter Profile Photo

🚨We are very pleased to announce the nominees for the 2024 Pwnie Awards! Be sure to tag your friends and catch us at Def Con! 🚨 🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇 docs.google.com/document/d/13J…

Margin Research (@margin_research) 's Twitter Profile Photo

You Can't Spell WebRTC without RCE - Part 2 blog post, which turns the vulnerabilities we injected in Part 1 into remote code execution on iOS 16.4! Follow along with ian dupont to learn more about the iOS shared cache, Corellium, and ROP in ARM64! margin.re/2024/07/you-ca…

👩‍💻 Paige Bailey (@dynamicwebpaige) 's Twitter Profile Photo

"In 28 minutes, XBOW matched 40 hours of work by the most experienced pentester, who has 20 years of experience, with both solving 85%." Very cool results from the XBOW team—and another great example of using generative models to accelerate work. How many automated pentesters

Margin Research (@margin_research) 's Twitter Profile Photo

In Part 3 of our blog series _You Can't Spell WebRTC without RCE_, we conclude our Signal-iOS research with commentary by ian dupont and michael on exploit limitations and IOCs! margin.re/2024/08/you-ca…

DistrictCon (@districtcon) 's Twitter Profile Photo

🚨The Junkyard Call For Bugs is Open! 🚨We want you to bring your most impactful, creative, or most meme-y bugs in end-of-life (EOL) products, and demonstrate them live on stage! Winners get 💰prize money 💰 districtcon.org/junkyard

🚨The Junkyard Call For Bugs is Open! 🚨We want you to bring your most impactful, creative, or most meme-y bugs in end-of-life (EOL) products, and demonstrate them live on stage! Winners get 💰prize money 💰
districtcon.org/junkyard
RE//verse (@reverseconf) 's Twitter Profile Photo

Join Vector 35’s Kyle Martin and Margin Research’s Ian Palleiko in Orlando Feb 24-27, 2025 to learn how to apply advanced program analysis techniques to the problem of vulnerability research. re-verse.io/pavr-24

Azeria (@fox0x01) 's Twitter Profile Photo

It’s interesting to see how quickly my Black Hat 2023 keynote predictions about AI started to become a reality. The security impacts of these AI agents (e.g. taking non-deterministic actions) are going to dramatically change our threat models. Interesting times ahead.