Max Moser (@rexploit) 's Twitter Profile
Max Moser

@rexploit

@[email protected] see you there

ID: 31230889

linkhttp://www.remote-exploit.org calendar_today14-04-2009 21:25:26

1,1K Tweet

2,2K Followers

821 Following

Max Moser (@rexploit) 's Twitter Profile Photo

If you want to hunt for MeetingOwl devices in your network. Check for devices with a MAC Address starting with BC:D7:13 or check your proxy/firewall/dns logs for connections to owllabs.com

Max Moser (@rexploit) 's Twitter Profile Photo

I will be at the Area41 Security Con and giving some insights on the #MeetingOwl issues during my talk. Come meet me in the hallway track 😀 during the conference days and have a good chat 🍻

quarkslab (@quarkslab) 's Twitter Profile Photo

Oops, they did it again! The Titan-M chip is the root of all security in Google's Pixel phones Damiano Melotti & Maxime Rossi Bellom will talk about their journey from Reversing & Fuzzing to Code Execution & leaking its encryption keys tomorrow at TROOPERS Conference troopers.de/troopers22/age…

Oops, they did it again!
The Titan-M chip is the root of all security in Google's Pixel phones
<a href="/DamianoMelotti/">Damiano Melotti</a>  &amp; <a href="/max_r_b/">Maxime Rossi Bellom</a> will talk about their journey from Reversing &amp; Fuzzing to Code Execution &amp; leaking its encryption keys tomorrow at <a href="/WEareTROOPERS/">TROOPERS Conference</a> 
troopers.de/troopers22/age…
Charles M. Ishihara (@n_o_t_h_a_n_k_s) 's Twitter Profile Photo

Had a look at quite a nice (new-ish?) way to dump LSASS memory into WinDBG Time Travel Debugging (TTD) format, and pull creds out offline. 🧵

@modzero@infosec.exchange (@mod0) 's Twitter Profile Photo

We found a security issue in the latest CrowdStrike #FalconSensor. The bug itself isn't worth a tweet as the severity is pretty low. However, we’d like to shed some light on a ridiculous vulnerability disclosure process with CrowdStrike. #CVE-2022-2841 modzero.com/modlog/archive…

Max Moser (@rexploit) 's Twitter Profile Photo

If you are privileged on system but Falcon is getting in you way. Fear not, just uninstall it. The uninstall token is not required. See modzero.com/modlog/archive… for details.

@modzero@infosec.exchange (@mod0) 's Twitter Profile Photo

Better make sure your password manager is secure -- or someone else will. We found critical security issues in the enterprise password manager Passwordstate that allowed to access passwords and gain a shell -- without any authentication #CVE-2022-3875 modzero.com/modlog/archive…

Julio Merino (@jmmv) 's Twitter Profile Photo

Please remind me how we are moving forward. In this video, a machine from the year ~2000 (600MHz, 128MB RAM, spinning-rust hard disk) running Windows NT 3.51. Note how incredibly snappy opening apps is. 👇

@modzero@infosec.exchange (@mod0) 's Twitter Profile Photo

How do you hack Internet-connected devices? Today, our colleagues parzel and @[email protected] will present their research at the #37C3 on how to turn a Poly VoIP phone into a wiretap, giving beginners some starting points for own research projects. events.ccc.de/congress/2023/…

@modzero@infosec.exchange (@mod0) 's Twitter Profile Photo

We identified critical vulnerabilities in MailCleaner. A command injection vulnerability can be exploited by sending an Email. Our report can be found here: modzero.com/en/advisories/… Kudos to chaos.social/@born0monday and chaos.social/@parzel #MailCleaner #CVE-2024-3191 #Infosec

@modzero@infosec.exchange (@mod0) 's Twitter Profile Photo

Shells at midnight: Exploiting the flexibility of Email addresses for offensive purposes. Today we are publishing a new blog post about our disclosure report on #MailCleaner #CVE-2024-3191: modzero.com/en/blog/beyond… @[email protected] will also present at Area41 Security Con today.