p3rr0 (@hperalta89) 's Twitter Profile
p3rr0

@hperalta89

ID: 1201573038329909254

calendar_today02-12-2019 18:45:21

68 Tweet

1,1K Followers

333 Following

Flashback Team (@flashbackpwn) 's Twitter Profile Photo

Our talk from offensivecon "Pwn2Own'ing Your Router Over the Internet" is on YouTube. Watch us reveal our Pwn2Own tricks and hack the Internets! youtube.com/watch?v=nnAxXn…

Our talk from <a href="/offensive_con/">offensivecon</a> "Pwn2Own'ing Your Router Over the Internet" is on YouTube. Watch us reveal our Pwn2Own tricks and hack the Internets!
youtube.com/watch?v=nnAxXn…
Bug Bounty Argentina (@bugbountyarg) 's Twitter Profile Photo

📢📢📢Comenzamos los anuncios de las charlas! Durante la Ekoparty | Hacking everything (el 2/11 en la sala D) El Mago nos contará como mediante técnicas de #OSINT aplicadas al #BugBounty cualquiera (y con pocos conocimientos técnicos) puede comenzar a ganar💰! #EKO2022

📢📢📢Comenzamos los anuncios de las charlas! Durante la <a href="/ekoparty/">Ekoparty | Hacking everything</a> (el 2/11 en la sala D) <a href="/soyelmago/">El Mago</a> nos contará como mediante técnicas de #OSINT aplicadas al #BugBounty cualquiera (y con pocos conocimientos técnicos) puede comenzar a ganar💰! 
#EKO2022
Bug Bounty Argentina (@bugbountyarg) 's Twitter Profile Photo

📢Hoy confirmamos la charla de L34r00t. Estará contando como de casualidad, pero prestando atención a lo que tenia frente a sus ojos, logró una vulnerabilidad critica y un #bounty de 4 cifras por fuera de un programa de #bugbounty!! Miercoles 2/11 en la Sala D de la #EKO2022

📢Hoy confirmamos la charla de <a href="/l34r00t/">L34r00t</a>. Estará contando como de casualidad, pero prestando atención  a lo que tenia frente a sus ojos, logró una vulnerabilidad critica y un #bounty de 4 cifras por fuera de un programa de #bugbounty!! Miercoles 2/11 en la Sala D de la #EKO2022
Bug Bounty Argentina (@bugbountyarg) 's Twitter Profile Photo

Simplemente gracias a tod@s ustedes por haber estado en nuestro espacio durante la Ekoparty | Hacking everything #eko2022! los esperamos el año que viene! linkedin.com/posts/bugbount…

Bug Bounty Argentina (@bugbountyarg) 's Twitter Profile Photo

🤩​El P3rr0 p3rr0 haciendo de las suyas en Corea como speaker en la conferencia #POC2022 (Power of Community powerofcommunity.net) Esto es llegar lejos con el #BugBounty, LITERAL! ¡Felicitaciones Perrito Malvado!💪

🤩​El P3rr0 <a href="/Hperalta89/">p3rr0</a> haciendo de las suyas en Corea como speaker en la conferencia #POC2022 (Power of Community powerofcommunity.net) 
Esto es llegar lejos con el #BugBounty, LITERAL!
¡Felicitaciones Perrito Malvado!💪
p3rr0 (@hperalta89) 's Twitter Profile Photo

Ya está disponible el video de mi presentación en Ekoparty | Hacking everything , muchas gracias Bug Bounty Argentina por proponer mi charla para el main track y el apoyo de toda la comunidad #BugBounty #bugbountytips m.youtube.com/watch?v=oAUKas…

p3rr0 (@hperalta89) 's Twitter Profile Photo

Slides from my talk about Electron and Microsoft Teams RCE at ekoparty and PoC conference drive.google.com/drive/folders/…

Jack Halon (@jack_halon) 's Twitter Profile Photo

To wrap up 2022, I'm releasing the final part of my 3-part browser exploitation series on Chrome! In this post, we demonstrate the practical use of the concepts we've learned throughout the series by analyzing and exploiting CVE-2018-17463. Enjoy! jhalon.github.io/chrome-browser…

starlabs (@starlabs_sg) 's Twitter Profile Photo

Today's post is not about security issues. Lê Hữu Quang Linh 🇻🇳 will share with us about the anti-debugging techniques utilised by KEPServerEX that prevent him from debugging their code while he was preparing for Pwn2Own Miami this year. starlabs.sg/blog/2023/02-g…

Eduardo Nuri (@eduardo_nuri) 's Twitter Profile Photo

They aren't enough write-ups around about 6 figures bounties in the community, hope it helps you to learn something new! Appreciate the feedback and support ❤️ #bugbounty #writeups #hackerone #bugcrowd #intigriti #togetherwehitharder

Bug Bounty Argentina (@bugbountyarg) 's Twitter Profile Photo

📣 Está noche 22:30hs por twitch.tv/soyelmago hacemos un live anunciando todos los detalles del evento que se viene! Además, se suman a la lista de auspiciantes nuestros amigos de Ekoparty | Hacking everything @kavak_ar Burp Bounty Edu Garcia ArtsSEC

Masato Kinugawa (@kinugawamasato) 's Twitter Profile Photo

Here is the technical details of MS Teams RCE I used in Pwn2Own Vancouver 2022! #shibuyaxss の資料公開しました!Pwn2Ownで賞金を獲得したTeamsの脆弱性について解説しています。 speakerdeck.com/masatokinugawa… (English) speakerdeck.com/masatokinugawa… (日本語) youtu.be/TMh_WbF9VnM (demo)

Ekoparty | Hacking everything (@ekoparty) 's Twitter Profile Photo

Charlas MainTrack #EKO2023 🔥 📌 Octavio Gianatiempo, Security Researcher, Faraday Security 📌 Javier Aguinaga, Security Researcher, Faraday Security 💡 “SADProtocol goes to Hollywood: Hijacking an IP camera stream as seen in the movies”: When people think about a compromised surveillance camera,

Charlas MainTrack #EKO2023 🔥

📌 <a href="/ogianatiempo/">Octavio Gianatiempo</a>, Security Researcher, <a href="/faradaysec/">Faraday Security</a> 
📌 <a href="/pastaCLS/">Javier Aguinaga</a>, Security Researcher, <a href="/faradaysec/">Faraday Security</a> 

💡 “SADProtocol goes to Hollywood: Hijacking an IP camera stream as seen in the movies”: When people think about a compromised surveillance camera,
TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-23-1769] Microsoft Skype Cross-Site Scripting Remote Code Execution Vulnerability (CVSS 8.8; Credit: Hector Peralta (@hperalta89) and Nicolas Armua (linkedin.com/in/slyfer/)) zerodayinitiative.com/advisories/ZDI…

Adrián { Lemon of troy } (@dracutdashf) 's Twitter Profile Photo

Happy with 3rd place in the H1 AWC, I know it's temporary, but for me, it's a huge achievement to rank among so many hackers worldwide. Proud to represent Argentina with my teammates. Thanks G4MB4 & p3rr0 for your collaboration!

Happy with 3rd place in the H1 AWC, I know it's temporary, but for me, it's a huge achievement to rank among so many hackers worldwide. Proud to represent Argentina with my teammates. Thanks <a href="/g4mb4h/">G4MB4</a> &amp; <a href="/Hperalta89/">p3rr0</a> for your collaboration!
matteo malvica ⭕ (@matteomalvica) 's Twitter Profile Photo

Big thanks to BSides Oslo for having me yesterday! Had an incredible time sharing my thoughts with such a fantastic crowd! Slides are up if you wanna check them out github.com/uf0o/conferenc…

Big thanks to <a href="/OsloBSides/">BSides Oslo</a> for having me yesterday! 
Had an incredible time sharing my thoughts with such a fantastic crowd!

Slides are up if you wanna check them out
github.com/uf0o/conferenc…
p3rr0 (@hperalta89) 's Twitter Profile Photo

This research allowed me to find critical bugs in several electron applications by finding public n-day exploits for older versions of chrome and adapting them to the electron framework. github.com/p3rr0x/Blog/tr… #BugBounty