Laszlo Szapula
@latsa99
Keep calm and pwn! Security researcher @TaszkSecLabs
ID: 734437256828719105
22-05-2016 17:34:22
59 Tweet
73 Followers
123 Following
Hello twitter, we're back with the blogging :) In the first post on our brand new research page, Gyorgy Miru (Gym) explains how he has exploited a heap overflow in the Samsung NPU Driver on Galaxy S10 and S20 labs.taszk.io/articles/post/…
Achievement unlocked: write a Linux kernel exploitation post in which a bootrom exploit is the throwaway sidebar. After his recent entry on exploiting Samsung's NPU, this follow-up from Gyorgy Miru (Gym) targets Huawei's own NPU driver instead to exploit a P40 Pro labs.taszk.io/articles/post/…
New Advisory: Use-After-Free in the Android ION Allocator - with commentary by Gyorgy Miru (Gym) on why we are publishing a 0-day (hint: Google's own advertised disclosure policy goals) labs.taszk.io/blog/post/61_a…
Log4Harmony: we've heard that vulns in Android log device drivers are cool, so here are some UAF, race condition, and KASLR leak bugs in Huawei's hwlog from Gyorgy Miru (Gym), reachable from untrusted and isolated app: labs.taszk.io/blog/post/78_h… labs.taszk.io/blog/post/77_h… labs.taszk.io/blog/post/79_h…
MOBILE NETWORK ATTACKS: EXPLOITING BASEBANDS AND APPLICATION PROCESSORS by Daniel Komaromy and Laszlo Szapula offensivecon.org/trainings/2024…
𝐃𝐨𝐧'𝐭 𝐁𝐞𝐥𝐢𝐞𝐯𝐞 𝐓𝐡𝐞 𝐇𝐲𝐩𝐞(𝐫𝐯𝐢𝐬𝐨𝐫) Daniel Komaromy & Laszlo Szapula went beyond the manual reverse engineering, built an emulator for the Huawei Hypervisor layer in their Kirin chipsets to expose a vulnerability. Only at Off-By-One Conference 2025! offbyone.sg/conference/dan…