Laszlo Szapula (@latsa99) 's Twitter Profile
Laszlo Szapula

@latsa99

Keep calm and pwn! Security researcher @TaszkSecLabs

ID: 734437256828719105

calendar_today22-05-2016 17:34:22

59 Tweet

73 Followers

123 Following

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Hello twitter, we're back with the blogging :) In the first post on our brand new research page, Gyorgy Miru (Gym) explains how he has exploited a heap overflow in the Samsung NPU Driver on Galaxy S10 and S20 labs.taszk.io/articles/post/…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Achievement unlocked: write a Linux kernel exploitation post in which a bootrom exploit is the throwaway sidebar. After his recent entry on exploiting Samsung's NPU, this follow-up from Gyorgy Miru (Gym) targets Huawei's own NPU driver instead to exploit a P40 Pro labs.taszk.io/articles/post/…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Patching bootroms? It’s a thing! In a follow-up to our Black Hat USA talk, szabolor investigates how Huawei’s OTA update addressed our bootrom vulnerabilities labs.taszk.io/articles/post/…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

New Advisory: Use-After-Free in the Android ION Allocator - with commentary by Gyorgy Miru (Gym) on why we are publishing a 0-day (hint: Google's own advertised disclosure policy goals) labs.taszk.io/blog/post/61_a…

Laszlo Szapula (@latsa99) 's Twitter Profile Photo

Finally, my personal IT security blog is up and running! (Don't expect too much tho, no super original content yet🙂) My fist post is about a tool I found that makes shellcode generation incredibly easy for CTF challenges... latsa99.github.io/posts/shellcra…

Laszlo Szapula (@latsa99) 's Twitter Profile Photo

I just published my second blog post, which is about my journey through learning Linux kernel exploitation! If you want to start pwning kernel, check it out 😁 #Kernel #Pwn latsa99.github.io/posts/kernel/

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Video and slides for “UnZiploc”: labs.taszk.io/articles/post/… In our new OTA exploitation research on Huawei phones we explored remote interfaces to get RCE and escalate to TrustZone using logic bugs only.

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Log4Harmony: we've heard that vulns in Android log device drivers are cool, so here are some UAF, race condition, and KASLR leak bugs in Huawei's hwlog from Gyorgy Miru (Gym), reachable from untrusted and isolated app: labs.taszk.io/blog/post/78_h… labs.taszk.io/blog/post/77_h… labs.taszk.io/blog/post/79_h…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

FaultyUSB: exploiting a TOCTOU race condition bug in recovery to get root on Huawei devices by emulating a malicious USB flash drive labs.taszk.io/articles/post/…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Can't get enough of Barbenheimer? Get your Basebanheimer fix at Hardwear.io | Samsung and Mediatek baseband over-the-air to Android vulnerability chains: previewing our upcoming talk and training | labs.taszk.io/articles/post/…

Daniel Komaromy (@kutyacica) 's Twitter Profile Photo

Looks like Samsung Mobile Security selected me as the #1 researcher for their 2023 Rewards Program Hall of Fame. Appreciate that, thank you! security.samsungmobile.com/hallOfFameInfo…

Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Unburdened By What Has Been: Exploiting New Attack Surfaces in Radio Layer 2 for Baseband RCE on Samsung Exynos labs.taszk.io/articles/post/…

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

𝐃𝐨𝐧'𝐭 𝐁𝐞𝐥𝐢𝐞𝐯𝐞 𝐓𝐡𝐞 𝐇𝐲𝐩𝐞(𝐫𝐯𝐢𝐬𝐨𝐫) Daniel Komaromy & Laszlo Szapula went beyond the manual reverse engineering, built an emulator for the Huawei Hypervisor layer in their Kirin chipsets to expose a vulnerability. Only at Off-By-One Conference 2025! offbyone.sg/conference/dan…

𝐃𝐨𝐧'𝐭 𝐁𝐞𝐥𝐢𝐞𝐯𝐞 𝐓𝐡𝐞 𝐇𝐲𝐩𝐞(𝐫𝐯𝐢𝐬𝐨𝐫) <a href="/kutyacica/">Daniel Komaromy</a> &amp; <a href="/LaTsa99/">Laszlo Szapula</a> went beyond the manual reverse engineering, built an emulator for the Huawei Hypervisor layer in their Kirin chipsets to expose a vulnerability. Only at <a href="/offbyoneconf/">Off-By-One Conference</a> 2025!
offbyone.sg/conference/dan…
Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Had fun giving our talk at Troopers. You can still catch Laszlo Szapula and erix7 with the encore presentation at Le Hack this Saturday! Advisories on the blog to follow.

Had fun giving our talk at Troopers. You can still catch <a href="/LaTsa99/">Laszlo Szapula</a> and <a href="/erix74/">erix7</a> with the encore presentation at Le Hack this Saturday! Advisories on the blog to follow.
Taszk Security Labs (@taszkseclabs) 's Twitter Profile Photo

Advisory release for our talk “Eastern Promises: Mobile VRP Lessons for Bug Hunters”, including Huawei Hypervisor and Unisoc TrustZone LPE exploits + 16 Mediatek Baseband IMS vulnerabilities labs.taszk.io/articles/post/…