Sideway (@sidewayre) 's Twitter Profile
Sideway

@sidewayre

Reverse-Engineering, low level stuff and goats. Pwning stuff @Synacktiv

ID: 961963106359496704

linkhttps://sideway.re calendar_today09-02-2018 14:00:51

140 Tweet

870 Followers

187 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

Earlier today, David B and vdehors were at CODE BLUE to present their work on the Tesla Model 3, which allowed them to score 2 entries during latest #Pwn2Own Vancouver

Earlier today, <a href="/_p0ly_/">David B</a> and <a href="/vdehors/">vdehors</a> were at <a href="/codeblue_jp/">CODE BLUE</a> to present their work on the Tesla Model 3, which allowed them to score 2 entries during latest #Pwn2Own Vancouver
JB Cayrou (@jbcayrou) 's Twitter Profile Photo

How to turn an unbalanced unlock kernel bug🪳into a Use-After-Free (CVE-2023-2612)? The #Grehack23 slides are now available 👉synacktiv.com/sites/default/…

Synacktiv (@synacktiv) 's Twitter Profile Photo

To facilitate reverse-engineering of large programs, vulnerability research and root-cause analysis on iOS, Android, and other major platforms, myr and Hexa released Frinet, a tool combining Frida with an enhanced version of Tenet. synacktiv.com/publications/f…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Synacktiv is looking for an additional team leader for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). synacktiv.com/responsable-de…

Phrack Zine (@phrack) 's Twitter Profile Photo

The time has come, and with it your reading material for the week. Phrack #71 is officially released ONLINE! Let us know what you think! phrack.org/issues/71/1.ht…

The time has come, and with it your reading material for the week.

Phrack #71 is officially released ONLINE! Let us know what you think!

phrack.org/issues/71/1.ht…
Synacktiv (@synacktiv) 's Twitter Profile Photo

A few months ago, the FreeBSD Foundation appointed us to audit two #FreeBSD critical components: the Bhyve hypervisor and the Capsicum sandboxing framework. Today, related advisories and patches have come out 🧵 1. Multiple vulnerabilities in libnv freebsd.org/security/advis…

F4b (@0xf4b) 's Twitter Profile Photo

Thank you everyone for having attended the finals, we really had fun commenting! 🥃 Huge congratulations to the competitors, it was a very stressful situation! 🥵 And it wouldn't have been possible without the amazing voydstack and Juju 💪

Specter (@specterdev) 's Twitter Profile Photo

I've published the repo for Byepervisor (we love named vulns out here). Contains exploit implementation for two PS5 hypervisor bugs for 2.xx and lower. Slides from the talk + vod should hopefully be published soon. github.com/PS5Dev/Byeperv…

itszn (@itszn13) 's Twitter Profile Photo

Rio After the first safari -> root chain we landed, I just sat there running it over and over in awe It’s very difficult to express that feeling, seeing months of complexity compressed down into a single moment….

Eloi Benoist-Vanderbeken (@elvanderb) 's Twitter Profile Photo

Better late than never... My Hexacon 2023 slides for "Finding and Exploiting an Old XNU Logic Bug" and the exploit code (WITH THE ANIMATED ASCII ART 🥷🔪🍎!!!) are up synacktiv.com/sites/default/… / github.com/synacktiv/CVE-…

nedwill (@nedwilliamson) 's Twitter Profile Photo

Last month Arizona State University I presented my work on formalizing automated bug discovery, developing a framework to characterize the full spectrum of approaches - from fuzzing to human analysis. I'm sharing my evolving perspective on the fundamental nature of the bug finding problem. Full

Synacktiv (@synacktiv) 's Twitter Profile Photo

In iOS 18.4, Apple introduced a bug in dynamic symbol resolutions for some specific exports. F4b took a long journey down a rabbit hole to understand its root cause. synacktiv.com/en/publication…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

A successful collision! Corentin BAYET (cbayet) from REverse_Tactics used 2 bugs to exploit ESXi, but the Use of Uninitialized Variable bug collided with a prior entry. His integer overflow was unique though, so he still earns $112,500 & 11.5 Master of Pwn points. #Pwn2Own

A successful collision! Corentin BAYET (<a href="/OnlyTheDuck/">cbayet</a>) from <a href="/Reverse_Tactics/">REverse_Tactics</a> used 2 bugs to exploit ESXi, but the Use of Uninitialized Variable bug collided with a prior entry. His integer overflow was unique though, so he still earns $112,500 &amp; 11.5 Master of Pwn points. #Pwn2Own
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Thomas Bouzerar (Major_Tom) and Etienne Helluy-Lafont from Synacktiv (Synacktiv) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own

Confirmed! Thomas Bouzerar (<a href="/MajorTomSec/">Major_Tom</a>) and Etienne Helluy-Lafont from Synacktiv (<a href="/Synacktiv/">Synacktiv</a>) used a heap-based buffer overflow to exploit #VMware Workstation. They earn $80,000 and 8 Master of Pwn points - sending the contest to over $1,000,000 total! #Pwn2Own
vic (@v1csec) 's Twitter Profile Photo

Userland iOS aficionados, I released a simple IDA plugin that should improve your Objective-C experience. For now it removes ARC function calls in decompiled code (eg objc_retain) and helps listing candidate callers to a method. Check it out at github.com/synacktiv/objc…

Synacktiv (@synacktiv) 's Twitter Profile Photo

The latest Synacktiv Summer Challenge was in 2019, and after 6 years, it's back! Send us your solution before the end of August, there are skills to learn and prizes to win 🎁 synacktiv.com/en/publication…