Patrick Biernat (@patrickbiernat) 's Twitter Profile
Patrick Biernat

@patrickbiernat

Security Researcher @ret2systems

ID: 1176686372

calendar_today13-02-2013 19:57:40

161 Tweet

601 Followers

270 Following

Marko Mladenovic (@bugdigger) 's Twitter Profile Photo

A little month than month ago i finished the wargames challanges by RET2 Systems. Before this course i had 0 knowledge regarding low-level exploitation techniques, mitigations and bypass strategies. The course really pushes you and gives you knowledge required to break into VR💯

RET2 Systems (@ret2systems) 's Twitter Profile Photo

RET2 is an RPISEC corporation. Sophia was deeply important to our own founding team, pushing our resolve to embrace the total unknown. RET2 simply would have never manifested had we not been friends. She was beyond remarkable. Her passing weighs heavily on our hearts.

RET2 WarGames (@ret2wargames) 's Twitter Profile Photo

We're now offering professional certificates for completing our fundamentals of software exploitation course on RET2 WarGames! 🎉😱 It'll be challenging, but arguably one of the most rewarding cybersecurity certificates you can hope to obtain: wargames.ret2.systems/certificates

RET2 WarGames (@ret2wargames) 's Twitter Profile Photo

In addition to rolling out training certificates for professionals, RET2 WarGames now offers a lower cost access tier for independent researchers interested in learning binary exploitation through a structured curriculum at-home 🏡🔥

In addition to rolling out training certificates for professionals, RET2 WarGames now offers a lower cost access tier for independent researchers interested in learning binary exploitation through a structured curriculum at-home 🏡🔥
RET2 WarGames (@ret2wargames) 's Twitter Profile Photo

We just added "Mission #0" to our fundamentals of software exploitation training platform🥳 It's a new challenge that combines both reverse engineering and exploitation to comprehensively test your skills on the classical topics of our course: wargames.ret2.systems

We just added "Mission #0" to our fundamentals of software exploitation training platform🥳 

It's a new challenge that combines both reverse engineering and exploitation to comprehensively test your skills on the classical topics of our course: wargames.ret2.systems
RET2 WarGames (@ret2wargames) 's Twitter Profile Photo

This upcoming self-guided hardware hacking course should be awesome, Matt is a top-notch instructor with great materials 👇👇

RET2 Systems (@ret2systems) 's Twitter Profile Photo

A few months back we submitted two exploit chains to the first ever Pwn2Own Automotive competition. We just released a blogpost (part 1 of 2) detailing the bugs we abused to remotely exploit the Phoenix CHARX industrial EV charger and win $60,000 🔥🔥 blog.ret2.io/2024/07/17/pwn…

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Part 2/2 of our Pwn2Own Automotive exploit writeup for the Phoenix CHARX is now out 🎉 This second post explains how we remotely bypassed ASLR and COP'd our way to a shell. It even includes a GitHub link to the full exploit code. Enjoy! blog.ret2.io/2024/07/24/pwn…

Part 2/2 of our Pwn2Own Automotive exploit writeup for the Phoenix CHARX is now out 🎉

This second post explains how we remotely bypassed ASLR and COP'd our way to a shell. It even includes a GitHub link to the full exploit code. Enjoy!

blog.ret2.io/2024/07/24/pwn…
RET2 Systems (@ret2systems) 's Twitter Profile Photo

A new, high-production, US-based security conference dedicated to reverse engineering & program analysis. Something like this is long overdue, sharing nothing but hype for this conference 🚀🎉

RET2 Systems (@ret2systems) 's Twitter Profile Photo

If a zero-day exploit hits your Sonos smart speakers and nobody is around to hear it, will they really make a sound? 👀 Find out next week at #Pwn2Own Ireland! #RCE #exploit #0day

If a zero-day exploit hits your <a href="/Sonos/">Sonos</a> smart speakers and nobody is around to hear it, will they really make a sound? 👀 Find out next week at #Pwn2Own Ireland! #RCE #exploit #0day
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Jack Dates of RET2 Systems (RET2 Systems) used a single Out-of-Bounds (OOB) write to exploit the #Sonos Era 300 speaker. He earns himself $60,000 and 6 Master of Pwn points. #Pwn2Own #P2OIreland

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Jack Dates of RET2 Systems (RET2 Systems) used an OOB Write to get a shell and a modified login page on the Synology DiskStation DS1823xs+. His second round win nets him $20,000 and 4 Master of Pwn points. #Pwn2Own #P2OIreland

Confirmed! Jack Dates of RET2 Systems (<a href="/ret2systems/">RET2 Systems</a>) used an OOB Write to get a shell and a modified login page on the Synology DiskStation DS1823xs+. His second round win nets him $20,000 and 4 Master of Pwn points. #Pwn2Own #P2OIreland
RET2 Systems (@ret2systems) 's Twitter Profile Photo

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural RE//verse (2025) is now available to stream on YouTube. Watch it here: youtube.com/watch?v=hGlIkg…

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural <a href="/REverseConf/">RE//verse</a> (2025) is now available to stream on YouTube.

Watch it here: youtube.com/watch?v=hGlIkg…
RET2 Systems (@ret2systems) 's Twitter Profile Photo

New blogpost! Want to see how we exploited Synology Inc. network-attached-storage devices at Pwn2Own Ireland? RCE to root via out-of-bounds NULL-byte writes, click the embed for a fun little writeup of CVE-2024-10442 🔎🎉 blog.ret2.io/2025/04/23/pwn…

RET2 Systems (@ret2systems) 's Twitter Profile Photo

What does it take to hack a Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇 blog.ret2.io/2025/06/11/pwn…

What does it take to hack a <a href="/Sonos/">Sonos</a> Era 300 for Pwn2Own? 

Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇

blog.ret2.io/2025/06/11/pwn…
RET2 Systems (@ret2systems) 's Twitter Profile Photo

We're excited to announce a new session of our Asynchronous Training: The Fundamentals of Browser Exploitation!💻💥🌐 📆Start Date: September 15th, 2025 🗺️Location: Remote / Self-Paced ✈️Booking and full info: ret2.io/trainings