zhiniang peng (@edwardzpeng) 's Twitter Profile
zhiniang peng

@edwardzpeng

Cyber Security & Cryptograhpy

ID: 3312092671

linkhttps://sites.google.com/site/zhiniangpeng/ calendar_today11-08-2015 03:43:01

88 Tweet

6,6K Followers

91 Following

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

writeup for #OpenStack Admin Account Takeover due to Unsafe Environment Handling in MuranoPL sites.google.com/site/zhiniangp…

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

2 Preauth RCE we reported on Nvidia Triton Inference Server patched this month, The current security state of AI infrastructure is fragile. nvidia.custhelp.com/app/answers/de…

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Two different bugs happened in different RPC call, different function, different class, but with similar pattern Merged by MSRC. I am not satisfied with the reason at all.

Two different bugs happened in different RPC call, different function, different class, but with similar pattern Merged by MSRC. I am not satisfied with the reason at all.
zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Preauth RCE on NVIDIA Triton Server, the current security state of AI infrastructure is fragile sites.google.com/site/zhiniangp…

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows sites.google.com/site/zhiniangp…

Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows sites.google.com/site/zhiniangp…
zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

I spent some time this week studying some talk of a recent top conference in cybersecurity (I won’t mention its name), which was a lot of nonsense.šŸ¤–

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Sharing our slides for #Blackhat EU 2024: Diving into Spooler: Discovering LPE and RCE Vulnerabilities in Windows Printer Driver github.com/edwardzpeng/pr…

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Sharing slides for another #blackhat EU 2024 talk of us: (Enhancing Automatic Vulnerability Discovery for Windows RPC/COM in New Ways) github.com/edwardzpeng/pr…

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

For years, there were no memory corruption exploitation in #Office. I once thought it was extremely difficult to achieve. But after recent research on Office, I believe it's feasible to write exploits for Office memory corruption bugs.

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Checked out #BlackHat Asia 2025's talks. Surprised to see so many academic presentations - feels like some of them just pasted papers onto slides. This is not my vibe. Did the security research community change?

zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

New blog: Be careful of Your UDP Service: Preauth DoS on Windows Deployment Service (remote, 0-click) sites.google.com/site/zhiniangp…

k0shl (@keyz3r0) 's Twitter Profile Photo

Excited to announce our talk has been accepted by Black Hat #BHUSA!🄳🄳🄳 In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. Can't wait to see y'all in Las Vegas! blackhat.com/us-25/briefing…

Excited to announce our talk has been accepted by
<a href="/BlackHatEvents/">Black Hat</a> #BHUSA!🄳🄳🄳
In my part of presentation, I’ll cover logic-based pre-auth remote vulnerabilities uncovered via novel abuse of Windows native HTTP API. 
Can't wait to see y'all in Las Vegas!
blackhat.com/us-25/briefing…
zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

CVE-2025-29957 is actually another bug we reported to Microsoft. The bug I blog about have the same impact, but Microsoft still didn't fix it, and will not fix it. sites.google.com/site/zhiniangp…