D_K (@d_k_dev) 's Twitter Profile
D_K

@d_k_dev

IT-Security Student, @allesctf Member, Co-Founder and Security Researcher @neodyme

ID: 722300982

calendar_today28-07-2012 14:42:03

41 Tweet

213 Followers

134 Following

Neodyme (@neodyme) 's Twitter Profile Photo

When CS:GO clients connected to our server, they got more than a game. We found 3 RCE vulnerabilities to give clients an unexpected 'welcome'. Ready for a deep-dive? ๐ŸŽฎ๐Ÿ”ง๐ŸŽ† neodyme.io/blog/csgo_fromโ€ฆ #InfoSec #CSGO #Exploit

ALLES (@allesctf) 's Twitter Profile Photo

Are you also tired from teams stealing flags or organizers stealing 0days from organizers in CTFs? Then you should play CCCamp CTF 2023, organized by ALLES!! The original, without monitoring! We still haven't implemented any :) More info coming soon!

CSCG (@c_s_c_g) 's Twitter Profile Photo

๐Ÿ‡ฉ๐Ÿ‡ช | Today, the BSI hosted Germany's #ECSC team. These talented youngsters proved their skills during CSCG and will represent Germany in ENISA's hacking competition next month ๐Ÿ‡ช๐Ÿ‡บ. Thanks BSI for having us! We had a great time!

๐Ÿ‡ฉ๐Ÿ‡ช | Today, the <a href="/BSI_Bund/">BSI</a> hosted Germany's #ECSC team. 

These talented youngsters proved their skills during CSCG and will represent Germany in <a href="/enisa_eu/">ENISA</a>'s hacking competition next month ๐Ÿ‡ช๐Ÿ‡บ.

Thanks <a href="/BSI_Bund/">BSI</a> for having us! We had a great time!
Neodyme (@neodyme) 's Twitter Profile Photo

Introducing Riverguard ๐Ÿž๏ธ๐Ÿ’‚ A new security tool for Solana program deployers... ๐Ÿงต riverguard.io

Introducing Riverguard ๐Ÿž๏ธ๐Ÿ’‚

A new security tool for Solana program deployers... ๐Ÿงต

riverguard.io
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Team Neodyme (Neodyme) used a stack-based buffer overflow to exploit the HP Color LaserJet Pro MFP 3301fdw printer. The earn $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland

Neodyme (@neodyme) 's Twitter Profile Photo

gg, this should fit nicely into our new office ๐Ÿ–จ๏ธ We'll be looking to complete the set tomorrow by attacking Lexmark CX331adwe at 3pm in the printers category and QNAP QHora-322 and Canon imageCLASS MF656Cdw at 5pm in the SOHO category. See you there!

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Our final SOHO Smashup of Day 2 ends with a partial collision. Neodyme (Neodyme) used 4 bugs, including a stack-based buffer overflow, in their successful demonstration, but 1 bug had previously been used in the contest. They earn $21,875 and 8.75 Master of Pwn points. #Pwn2Own

Our final SOHO Smashup of Day 2 ends with a partial collision. Neodyme (<a href="/Neodyme/">Neodyme</a>) used 4 bugs, including a stack-based buffer overflow, in their successful demonstration, but 1 bug had previously been used in the contest. They earn $21,875 and 8.75 Master of Pwn points. #Pwn2Own
Neodyme (@neodyme) 's Twitter Profile Photo

Since we had used a different setup without any administrator account, our official attempt during #Pwn2Own failed. However, Trend Zero Day Initiative provided us with a second chance to present our Lexmark exploit and it worked ๐Ÿ–จ๏ธ๐ŸŽ‰

Since we had used a different setup without any administrator account, our official attempt during #Pwn2Own failed. However, <a href="/thezdi/">Trend Zero Day Initiative</a> provided us with a second chance to present our Lexmark exploit and it worked ๐Ÿ–จ๏ธ๐ŸŽ‰
Neodyme (@neodyme) 's Twitter Profile Photo

ND people are @ #38c3 in Hamburg, Germany. Be sure to check out our two talks about LPEs in AV/EDR Products (Saturday, 4 PM YELL) and a not yet mitigated Bitlocker Flaw! (Saturday, 7:15 PM HUFF)

ND people are @ #38c3 in Hamburg, Germany. Be sure to check out our two talks about LPEs in AV/EDR Products (Saturday, 4 PM YELL) and a not yet mitigated Bitlocker Flaw! (Saturday, 7:15 PM HUFF)
Neodyme (@neodyme) 's Twitter Profile Photo

Following our #38c3 talk about exploiting security software for privilege escalation, we're excited to kick off a new blog series! ๐ŸŽŠ Check out our first blog post on our journey to ๐Ÿ’ฅ exploit five reputable security products to gain privileges via COM hijacking:

CSCG (@c_s_c_g) 's Twitter Profile Photo

The Cyber Security Challenge Germany 2025 has started! ๐ŸŽ‰ The competition runs from March 1 - 18:00 CET to May 1 - 18:00 CEST. We're excited to announce that we are inviting the top 6 DACH players in the EARTH category to the Deutsche Hacking Meisterschaft! Participate now at: play.cscg.live

Deutsche Hacking Meisterschaft (@dhm_ctf) 's Twitter Profile Photo

Would you like to participate in the German Hacking Championship next year? ๐Ÿ’ป๐ŸŽ‰Then, your next chance to qualify is this weekend! Have fun at #enowars, an attack-defense CTF hosted by ENOFLAG.