DiegoAltF4 (@diego_altf4) 's Twitter Profile
DiegoAltF4

@diego_altf4

Binary Exploitation & Fuzzing enthusiast with a special focus on Hypervisors | @zeroclicksh

ID: 1125427403327725568

calendar_today06-05-2019 15:49:37

36 Tweet

696 Followers

1,1K Following

PagedOut (@pagedout_zine) 's Twitter Profile Photo

Leaking Host KASLR from Guest VMs Using Tagged TLB by renorobert Article Highlight #14 - check it out in Paged Out! #4 page 58 pagedout.institute/download/Paged…

Leaking Host KASLR from Guest VMs Using Tagged TLB by <a href="/renorobertr/">renorobert</a> 

Article Highlight #14 - check it out in Paged Out! #4 page 58
pagedout.institute/download/Paged…
farmpoet (@f4rmpoet) 's Twitter Profile Photo

It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. 🧵

Phrack Zine (@phrack) 's Twitter Profile Photo

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…
Angelboy (@scwuaptx) 's Twitter Profile Photo

Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Well written blog post on exploiting a Use-after-Free (UaF) in Linux kernel (CVE-2024-0582, io_uring) blog.exodusintel.com/2024/03/27/min… Credits Oriol Castejón (Exodus Intelligence) #iouring #infosec

Well written blog post on exploiting a Use-after-Free (UaF) in Linux kernel (CVE-2024-0582, io_uring)

blog.exodusintel.com/2024/03/27/min…

Credits Oriol Castejón (<a href="/XI_Research/">Exodus Intelligence</a>)

#iouring #infosec
Synacktiv (@synacktiv) 's Twitter Profile Photo

A few months ago, the FreeBSD Foundation appointed us to audit two #FreeBSD critical components: the Bhyve hypervisor and the Capsicum sandboxing framework. Today, related advisories and patches have come out 🧵 1. Multiple vulnerabilities in libnv freebsd.org/security/advis…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Android Virtualization Framework - runs the "host" (Android and Linux kernel) in a VM and launches isolated envs. (= pVMs). Based on KVM but offloads complex code to the host VM. pVM firmware is in Rust - youtube.com/watch?v=K24dmA… - source.android.com/docs/core/virt… - android.googlesource.com/platform/packa…

Anderson Nascimento (@andersonc0d3) 's Twitter Profile Photo

I didn't know about VMware vprobes, I discovered it accidentally. We can instrument the VM from the host with lots of probe points and globals. I used it to locate the TR.base address, as the TR register is not exposed to GDB, not even with the monitor command. This URL is old

DiegoAltF4 (@diego_altf4) 's Twitter Profile Photo

Blog post coming soon with an in-depth analysis and exploit development for CVE-2023-22098, discovered by the incredible Andy Nguyen! Stay tuned, VM wizards!

DiegoAltF4 (@diego_altf4) 's Twitter Profile Photo

Excited to be mentioned in the new exploits.club Newsletter! 🎉 It’s an honor to be featured alongside such skilled hackers, including my friend Klecko. If you haven’t checked out the posts yet, don’t miss out!

gabe sherman (@gabe_sherman6) 's Twitter Profile Photo

Need a fuzzing harness? No time to write one? Tired of false-positives? Let OGHarn lead the way to bug discovery!🐞 I'm excited to share my first paper(with Stefan Nagy)"No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing Harnesses" at ICSE 2025!

roddux (@roddux) 's Twitter Profile Photo

I find myself repeating this a bit, so fuck it, here's how to get into an unprivileged namespace on Ubuntu 24.04/24.10. PSA: linux is stupid and for nerds, and Canonical/Ubuntu suck at security. $ busybox sh -c "unshare -Urmin" too embarassing to even call it a bypass

I find myself repeating this a bit, so fuck it, here's how to get into an unprivileged namespace on Ubuntu 24.04/24.10.

PSA: linux is stupid and for nerds, and <a href="/Canonical/">Canonical</a>/<a href="/ubuntu/">Ubuntu</a> suck at security.

$ busybox sh -c "unshare -Urmin"

too embarassing to even call it a bypass
Crusaders of Rust (@cor_ctf) 's Twitter Profile Photo

We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… 👀

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Outstanding! Nguyen Hoang Thach (Thach Nguyen Hoang 🇻🇳) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin

Outstanding! Nguyen Hoang Thach (<a href="/hi_im_d4rkn3ss/">Thach Nguyen Hoang 🇻🇳</a>) of STARLabs SG used a single integer overflow to exploit #VMware ESXi - a first in #Pwn2Own history. He earns $150,000 and 15 Master of Pwn points. #P2OBerlin
Enrique Soriano @esoriano@social.linux.pizza (@e__soriano) 's Twitter Profile Photo

⚠última llamada!!! Mañana tenemos las Criptored Cybersecurity Talks en Fuenlabrada, a las 17:00 Los alumnos de la URJC pueden solicitar créditos RAC :) plz RT