REverse_Tactics (@reverse_tactics) 's Twitter Profile
REverse_Tactics

@reverse_tactics

Software reverse engineering & vulnerability discovery company.

ID: 1525411814066073600

linkhttps://www.reversetactics.com/ calendar_today14-05-2022 09:45:01

24 Tweet

637 Followers

2 Following

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Our team is ready for another edition of #Pwn2Own Vancouver, stay tuned for some VirtualBox VM escape and Windows elevation of privileges ! cbayet is on-site at Vancouver to meet you all !

Our team is ready for another edition of #Pwn2Own Vancouver, stay tuned for some VirtualBox VM escape and Windows elevation of privileges ! <a href="/OnlyTheDuck/">cbayet</a> is on-site at Vancouver to meet you all !
REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

It's a full win! During the first day of #Pwn2Own Vancouver 2024, we demonstrated a fullchain exploit that escaped from an Oracle Virtualbox's virtual machine, followed by a local elevation of privilege on the Windows 11 host!

It's a full win! During the first day of #Pwn2Own Vancouver 2024, we demonstrated a fullchain exploit that escaped from an Oracle Virtualbox's virtual machine, followed by a local elevation of privilege on the Windows 11 host!
REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Live from Cork for #Pwn2Own Ireland! Tomorrow at 3PM (Cork time), we will exploit 3 vulnerabilities to compromise both the QNAP QHora322 router and TS-464 NAS in a SOHO smashup. Stay tuned !

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

With so many variables in chained exploits and unknown network setups, anything can happen—but we’re thrilled that our tactics worked flawlessly in under 15 seconds across two different devices at #Pwn2Own

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Ready for GreHack ! This Friday, catch cbayet's talk "Attacking Hypervisors: A practical case". If you're attending, Last year's talk is a must-read for background on hypervisor security. Check it out here : reversetactics.com/publications/2…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Slides & video from our GreHack talk "Attacking Hypervisors - A Practical Case" are online! Learn how we exploited vulnerabilities to escape VirtualBox during Pwn2Own Vancouver 2024: reversetactics.com/publications/2…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

For the first time, our training "Bug Hunting in Hypervisors" is open to the public at REcon ! Designed for security researchers,we will dive into VM escapes, hypervisor attack surfaces, and real-world exploitation. More info: recon.cx/2025/trainingB…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Could not dream of a better advertisement for our training "Bug Hunting in Hypervisors" at REcon ! Students will be expected to (almost) do this in one day šŸ˜‰ More details: recon.cx/2025/trainingB…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Excited to announce our talk at #TyphoonCon2025: "Journey to freedom"! cbayet will share how we escaped VirtualBox and chained it to Windows kernel LPE at #Pwn2Own 2024. Expect a story-driven session filled with insights from the high-stakes environment of #Pwn2Own !