 
                                Dominik Penner
@zer0pwn
security researcher in the pursuit of knowledge @watchdog_sec
@evolvedthreat. co-founder @hackerschange. formerly @nccgroupinfosec
ID: 437250058
https://evolvedthre.at/ 15-12-2011 05:32:37
7,7K Tweet
5,5K Followers
1,1K Following
 
        Dino A. Dai Zovi It was known to be possible since at least 1972 :) See the end of page 64 / beginning of page 64 here csrc.nist.gov/files/pubs/con… But yeah, RTM is a legend for actually exploiting it at scale for the first time. Then Thomas Lopatic and 8lgm dropped bof vulns/exploits in 1995 and
 
         
         
         
         
        It's confirmed! Ken Gannon / 伊藤 剣 (@yogehi) of Mobile Hacking Lab, and Dimitrios Valsamaras (Dimitri Os) of Summoning Team (SummoningTeam) used five different bugs to exploit the #Samsung Galaxy S25. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
 
                        
                    
                    
                    
                 
         
         
        Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm
 
         
        First and foremost, Thank you God for all of this. Second, our eternal respect to the amazing teams Trend Zero Day Initiative and Trend Micro for making this competition possible! Third, thank you to the film crew (blackrabbitint) working with zdi to make all of those great videos of us!
 
         
        O(N) the Money: Scaling Vulnerability Research with LLMs by Caleb Gross noperator.dev/posts/on-the-m…
 
         
         
         
         
         
         
        