Jaeho Jeong (@jeongzero) 's Twitter Profile
Jaeho Jeong

@jeongzero

Security researcher @78_lab

ID: 1461220572252483584

calendar_today18-11-2021 06:32:07

3 Tweet

20 Followers

94 Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

A practical approach to IoT devices vulnerability research Series (2021) by Ruben Santamarta (IOActive Labs) Part 1: labs.ioactive.com/2021/02/a-prac… Part 2: labs.ioactive.com/2021/02/a-prac… Part 3: labs.ioactive.com/2021/02/a-prac… #iot

A practical approach to IoT devices vulnerability research
Series (2021) by Ruben Santamarta (<a href="/IoaLabs/">IOActive Labs</a>)

Part 1: labs.ioactive.com/2021/02/a-prac…
Part 2: labs.ioactive.com/2021/02/a-prac…
Part 3: labs.ioactive.com/2021/02/a-prac…

#iot
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Tutorial on EV charger firmware extraction, analysis, and Emulation github.com/onekey-sec/BHE… #embedded #cybersecurity

Tutorial on EV charger firmware extraction, analysis, and Emulation

github.com/onekey-sec/BHE…

#embedded #cybersecurity
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Collision! Dong, 남훈, Jaeho Jeong, 정상수, and nonetype of 78ResearchLab hit a one‑vulnerability collision against the Alpine iLX‑F511, earning $5,000 USD and 1 Master of Pwn point. #Pwn2Own #P2OAuto

Collision! <a href="/gbdngb12/">Dong</a>, <a href="/pwnstar96/">남훈</a>, <a href="/jeongZero/">Jaeho Jeong</a>, <a href="/sangs00Jeong/">정상수</a>, and <a href="/nonetype_pwn/">nonetype</a> of 78ResearchLab hit a one‑vulnerability collision against the Alpine iLX‑F511, earning $5,000 USD and 1 Master of Pwn point. #Pwn2Own #P2OAuto
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

As if competing in #Pwn2Own isn’t pressure enough, imagine being on stage in front of your professor as well! The team from 78ResearchLab is doing just that as the successfully target the Phoenix Contact CHARX. Well done! #P2OAuto

As if competing in #Pwn2Own isn’t pressure enough, imagine being on stage in front of your professor as well! The team from 78ResearchLab is doing just that as the successfully target the Phoenix Contact CHARX. Well done! #P2OAuto
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Verified! 김동희 and kjg of Team K exploited two vulnerabilities - an out-of-bounds read and a stack-based buffer overflow - against the Alpine iLX-F511, earning $10,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto

Verified! <a href="/heehee_0219_/">김동희</a> and <a href="/kimjor22/">kjg</a> of Team K exploited two vulnerabilities - an out-of-bounds read and a stack-based buffer overflow - against the Alpine iLX-F511, earning $10,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Another Collision! Dong, 남훈, Jaeho Jeong, 정상수, nonetype of 78ResearchLab targeted the Phoenix Contact CHARX SEC‑3150, chaining four bugs (two unique and two collisions) to earn $15,000 USD and 3 Master of Pwn points.

Another Collision! <a href="/gbdngb12/">Dong</a>, <a href="/pwnstar96/">남훈</a>, <a href="/jeongZero/">Jaeho Jeong</a>, <a href="/sangs00Jeong/">정상수</a>, <a href="/nonetype_pwn/">nonetype</a> of 78ResearchLab targeted the Phoenix Contact CHARX SEC‑3150, chaining four bugs (two unique and two collisions) to earn $15,000 USD and 3 Master of Pwn points.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Collision! Dong, 남훈, Jaeho Jeong, 정상수, and nonetype of 78ResearchLab targeted the Kenwood DNR1007XR, exploiting one n-day vulnerability along with two collisions to earn $2,500 USD and 1 Master of Pwn point. #Pwn2Own #P2OAuto

Collision! <a href="/gbdngb12/">Dong</a>, <a href="/pwnstar96/">남훈</a>, <a href="/jeongZero/">Jaeho Jeong</a>, <a href="/sangs00Jeong/">정상수</a>, and <a href="/nonetype_pwn/">nonetype</a> of 78ResearchLab targeted the Kenwood DNR1007XR, exploiting one n-day vulnerability along with two collisions to earn $2,500 USD and 1 Master of Pwn point. #Pwn2Own #P2OAuto
0xor0ne (@0xor0ne) 's Twitter Profile Photo

"From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa) docs.google.com/presentation/d… #infosec #qemu

"From Zero to QEMU: A journey into system emulation" (slide deck by Antonio Nappa)

docs.google.com/presentation/d…

#infosec #qemu
0xor0ne (@0xor0ne) 's Twitter Profile Photo

“Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes” (slide deck by Xeno Kovah) darkmentor.com/publication/20… #infosec

“Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools &amp; classes” (slide deck by <a href="/XenoKovah/">Xeno Kovah</a>)

darkmentor.com/publication/20…

#infosec
0xor0ne (@0xor0ne) 's Twitter Profile Photo

VulHunt: vulnerability detection framework by BINARLY🔬 github.com/vulhunt-re/vul… Accompanying blog series: binarly.io/blog/vulhunt-i… binarly.io/blog/vulhunt-i… binarly.io/blog/vulnerabi… binarly.io/blog/vulhunt-i… binarly.io/blog/agentic-v… #infosec

VulHunt: vulnerability detection framework by <a href="/binarly_io/">BINARLY🔬</a>

github.com/vulhunt-re/vul…

Accompanying blog series:

binarly.io/blog/vulhunt-i…
binarly.io/blog/vulhunt-i…
binarly.io/blog/vulnerabi…
binarly.io/blog/vulhunt-i…
binarly.io/blog/agentic-v…

#infosec