Rick de Jager (@rdjgr) 's Twitter Profile
Rick de Jager

@rdjgr

CyberSecurity student at @TUeindhoven - CTF with Superflat / @0rganizers / ICC team Europe 22/23/24

ID: 1061749688943239168

linkhttp://bricked.tech calendar_today11-11-2018 22:37:06

88 Tweet

1,1K Followers

561 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In his first blog for us (but hardly his first blog), Byte Insight details two #Autel EV Charger bugs used during #Pwn2Own Automotive. He also looks at the patches from Autel & speculates how they could have done it differently. zerodayinitiative.com/blog/2024/10/2…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Verified! PHP Hooligans / Midnight Blue (Midnight Blue) used a single bug to exploit the Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland

Verified! PHP Hooligans / Midnight Blue (<a href="/midnightbluelab/">Midnight Blue</a>) used a single bug to exploit the  Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland
Rick de Jager (@rdjgr) 's Twitter Profile Photo

This is easily the most impactful bug I've found in my career. Keep an eye out for patches for your Synology NASes and install ASAP

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! PHP Hooligans / Midnight Blue (Midnight Blue) used an OOB Write and a memory corruption bug to go from the QNAP QHora-322 to the Lexmark printer. Their successful SOHO Smashup earns them $25,000 and 10 Master of Pwn points. #Pwn2Own #P2OIreland

Confirmed! PHP Hooligans / Midnight Blue (<a href="/midnightbluelab/">Midnight Blue</a>) used an OOB Write and a memory corruption bug to go from the QNAP QHora-322 to the Lexmark printer. Their successful SOHO Smashup earns them $25,000 and 10 Master of Pwn points. #Pwn2Own #P2OIreland
Rick de Jager (@rdjgr) 's Twitter Profile Photo

And that's a wrap on our exploits! I'm immediately hopping on a plane to Chile for the #ic3games to rep team Europe. This was a wild week

WIRED (@wired) 's Twitter Profile Photo

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse. wired.trib.al/Cwane8K

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Another confirmation! The PHP Hooligans used a heap-based buffer overflow to exploit the Autel charger. They earn $50,000 and 5 Master of Pwn points. #P2OAuto #Pwn2Own

Another confirmation! The PHP Hooligans used a heap-based buffer overflow to exploit the Autel charger. They earn $50,000 and 5 Master of Pwn points. #P2OAuto #Pwn2Own
TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

We’re delighted to welcome Rick de Jager & Carlo Meijer to #TyphoonCon2025! 🎤🔥 Be sure to join us in Seoul on May 29-30 for their amazing talk! 🔗 typhooncon.com/agenda

Soya Aoyama (@soyaaoyama) 's Twitter Profile Photo

We'd like to thank the speaker who will be presenting at BSides Tokyo 2025! Speaker: Rick de Jager & Carlo Meijer Title: Dialing into the Past: RCE via the Fax Machine – Because Why Not?