Quan Jin (@jq0904) 's Twitter Profile
Quan Jin

@jq0904

It's easy to learn but hard to master

ID: 3288760939

calendar_today23-07-2015 10:59:34

534 Tweet

3,3K Followers

580 Following

Lei Cao (@iamelli0t) 's Twitter Profile Photo

[New Blog Post] Analysis of DirectComposition Binding and Tracker object vulnerability iamelli0t.github.io/2021/08/15/Dir…

[New Blog Post] Analysis of DirectComposition Binding and Tracker object vulnerability
iamelli0t.github.io/2021/08/15/Dir…
Quan Jin (@jq0904) 's Twitter Profile Photo

After doing some debug and reverse on CVE-2021-40444, I think the developer of MS should re-read this article. They made another mistake on this issue.

Quan Jin (@jq0904) 's Twitter Profile Photo

It seems that MS has correctly patched the cab path traversal issue(part of CVE-2021-40444), now it will convert forward slashes (/) into back slashes (\) before calling PathCchCanonicalizeA 👏

It seems that MS has correctly patched the cab path traversal issue(part of CVE-2021-40444), now it will convert forward slashes (/) into back slashes (\) before calling PathCchCanonicalizeA 👏
Quan Jin (@jq0904) 's Twitter Profile Photo

#BHUSA I will share some experience and insights on itw Windows LPE 0day hunting at Black Hat USA 2022. It's a great honor to be invited by Black Hat

#BHUSA I will share some experience and insights on itw Windows LPE 0day hunting at Black Hat USA 2022. It's a great honor to be invited by <a href="/BlackHatEvents/">Black Hat</a>
Quan Jin (@jq0904) 's Twitter Profile Photo

Glad to be credited along with others👏, anyone who had learned my Black Hat USA 2022 slides should catch this itw 0day: i.blackhat.com/USA-22/Thursda…

Glad to be credited along with others👏, anyone who had learned my Black Hat USA 2022 slides should catch this itw 0day: i.blackhat.com/USA-22/Thursda…
PixiePoint Security (@pixiepointsec) 's Twitter Profile Photo

New year, new blog post! CVE-2021-31985: Exploiting the Windows Defender AsProtect Heap Overflow Vulnerability pixiepointsecurity.com/blog/nday-cve-…

Samir (@sbousseaden) 's Twitter Profile Photo

New blog post is up, exploring detection options for some recent In- the- Wild Windows LPE 0- days elastic.co/security-labs/…

New blog post is up, exploring detection options for some recent In- the- Wild Windows LPE 0- days 

elastic.co/security-labs/…
Quan Jin (@jq0904) 's Twitter Profile Photo

Two days later, we'll discuss 10 ITW Windows CLFS exploits at the Off-By-One Conference. This summary of a two-year journey will include references to others' work and new details not previously disclosed. Attendees will gain a more comprehensive understanding of these crazy exploits.

Quan Jin (@jq0904) 's Twitter Profile Photo

Today, I saw that Microsoft has introduced targeted mitigation for CLFS, which indicates that the attacks against CLFS have come to an end. Below is our talk from this year's Off-By-One conference on in the wild CLFS exploits over the past two years. youtube.com/watch?v=tOwSet…

Quan Jin (@jq0904) 's Twitter Profile Photo

Too lazy to archive my presentation slides, but I finally did it, including the slide on CLFS from the Off-By-One 2024 conference, and the awesome 010 Editor Template to parse CLFS Log file (.blf) by Mas0n github.com/jq0904/Confere…

Quan Jin (@jq0904) 's Twitter Profile Photo

Happy April Fool's Day! For anyone looking for in-the-wild samples for CVE-2024-9680 & CVE-2024-49039 fullchain in Firefox, here is one of them(with some missing information): virustotal.com/gui/file/e0017…