meh (@mehqq_) 's Twitter Profile
meh

@mehqq_

Pwning in HITCON;
Security Researcher of DEVCORE

ID: 785690779809222660

calendar_today11-10-2016 03:57:34

224 Tweet

4,4K Takipçi

101 Takip Edilen

Hossein Lotfi (@hosselot) 's Twitter Profile Photo

Nice writeup+(0x41414141) PoC for Mozilla Firefox HTML5 Stream Parsing Use-after-free Vulnerability (CVE-2018-18500) by Yaniv Frank from SophosLabs: news.sophos.com/en-us/2019/04/…

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

It's my honor to present at #BHUSA again! meh and I will show our research and disclose pre-auth RCEs on at least 3 leading SSL VPN vendors! blackhat.com/us-19/briefing… Black Hat

Angelboy (@scwuaptx) 's Twitter Profile Photo

Here is my challenge in WCTF 2019. github.com/scwuaptx/LazyF… Hope everyone can learn more windows heap from this challenge. About windows 10 NT heap slideshare.net/AngelBoy1/wind… I only write Chinese version slide, I will release an English version soon.

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Appetizer for our #BHUSA and #DEFCON talk ! meh and I will cover more hard-core exploitations, crazy bugs chains and SSL VPN 0days in our incoming presentation! Please look forward to it :P blog.orange.tw/2019/07/attack…

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Just drop the RCEs, slides(Black Hat will fix soon) and blog of meh and me's #BHUSA and #DEFCON talk - Infiltrating Corporate Intranet Like NSA: Pre-auth RCE on Leading SSL VPNs! Please check that and let us know if you have any questions! blog.orange.tw/2019/08/attack…

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

The last part of our Attacking SSL VPN series is out - The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! blog.orange.tw/2019/09/attack… "If you have a nuclear level weapon, when is it ready for public disclosure?"

Sam Curry (@samwcyo) 's Twitter Profile Photo

New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty samcurry.net/filling-in-the… Featuring... d0nut 🦀 André Baptista Fisher José Luís Sousa Yassine Aboukir 🐐 ramsexy

New writeup, one of my favorite bugs 🤠 -

Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty

samcurry.net/filling-in-the…

Featuring...
<a href="/d0nutptr/">d0nut 🦀</a> <a href="/0xacb/">André Baptista</a> <a href="/Regala_/">Fisher</a> <a href="/JLLiS/">José Luís Sousa</a> <a href="/Yassineaboukir/">Yassine Aboukir 🐐</a> <a href="/plmaltais/">ramsexy</a>
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! The DEVCORE team of Orange Tsai 🍊, Angelboy and meh used an elegant heap overflow to get code execution on the #Synology NAS during their 2nd attempt. They earn themselves $20,000 and 2 Master of Pwn points.

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

I know there are lots of people waiting for the recent Microsoft Exchange pre-auth RCE on our side. This is a short advisory and detailed timeline. proxylogon.com #proxylogon

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

A #Pwn2Own #AfterDark success! The #Devcore team used a code injection bug to take over the Lexmark MC3224i printer. They win $20,000 and 2 Master of Pwn points. They now trail Synacktiv by only 1 point. #P2OAustin #MasterOfPwn

A #Pwn2Own #AfterDark success! The #Devcore team used a code injection bug to take over the Lexmark MC3224i printer. They win $20,000 and 2 Master of Pwn points. They now trail <a href="/Synacktiv/">Synacktiv</a> by only 1 point. #P2OAustin #MasterOfPwn