Ben

174 posts

Ben

Ben

@XploitBengineer

Android Vulnerability Researcher, Pwn2Own 202{3, 5}

planet earth Beigetreten Nisan 2016
595 Folgt1K Follower
Ben retweetet
rev.ng
rev.ng@_revng·
🎥 How does rev.ng detect jump table? In this presentation Ale explains how the rev.ng decompiler detects jump tables and, more in general, how it devirtualizes indirect jumps.
English
1
4
25
1.9K
Ben
Ben@XploitBengineer·
@SinSinology @InterruptLabs It's a mystery, for sure. Looks like you had a great time in Japan btw, solid work 💪🏻
English
1
0
1
97
SinSinology
SinSinology@SinSinology·
@XploitBengineer @InterruptLabs you're right! that looks like mitm to me too! i'm wrong in that case, now i got no idea when it is and when its not allowed
English
1
0
0
88
Ben
Ben@XploitBengineer·
@SinSinology @InterruptLabs Mitm is still in-scope for mobile, smart home etc categories right? I didn't realise this change happened in 2024 though, even more frustrated I didn't notice now 🥴
English
1
0
3
218
SinSinology
SinSinology@SinSinology·
@InterruptLabs @XploitBengineer banger blog Ben, as always! small note about this part: "the only categories that had this rule change were categories with Synology devices." mitm, arp spoof, dns poison are out of scope for all targets since october 2024
English
1
0
9
1.5K
Ben retweetet
pam
pam@pamoutaf·
Helloooo! BlackHoodie still has some spots for their training at DistrictCon. The class will focus on reverse engineering and exploiting an integer overflow bug in libpng, with @pinkflawd Sign up today 😊 blackhoodie.re/DistrictCon202…
English
0
5
14
7.2K
Ben
Ben@XploitBengineer·
I posted a short blog about how a Samsung GPU vulnerability (CVE-2025-21479) can be leveraged for an LPE on affected devices xploitbengineer.github.io/CVE-2025-21479
English
6
80
255
29.4K
Ben retweetet
G. Geshev
G. Geshev@munmap·
Mildly pimped-up demo of our #Pwn2Own exploit shown on a Galaxy S23. Mind the hysterical memes-to-0day ratio 😅 Props to @thezdi for putting up with us and to all the hackers who made it a blast.
English
3
11
74
6.1K
Ben
Ben@XploitBengineer·
@m40282845 I tried it yesterday - pretty darn good
English
0
0
2
118
michael
michael@m40282845·
@XploitBengineer Have you had a pint of the local Guinness (Murphys? Or something)?
English
1
0
0
164
Ben
Ben@XploitBengineer·
Where you get sent for hacking a Samsung 👀
Ben tweet media
English
1
0
25
1.9K
Ben
Ben@XploitBengineer·
@w1ntercoats @LinxzSec Good. The farming community wasn't ready for you yet.
English
0
0
3
399
wintercoats
wintercoats@w1ntercoats·
absolute legend! Incredibly talented dude who is still very early on in his career, very proud!!! @XploitBengineer Also wouldn't be a p2o entry without our resident boss man too @munmap. Congratulations guys
TrendAI Zero Day Initiative@thezdi

Bang! Interrupt Labs successfully took over the #Samsung Galaxy 25 with 1 click. They remotely enabled the camera and location services, which has some frightening privacy implications. They head off to the disclosure room to explain how it works. #Pwn2Own

English
1
0
25
4K
Ben
Ben@XploitBengineer·
@streypaws Thank you :)
English
0
0
0
102
Ben
Ben@XploitBengineer·
@SinSinology Cheers mate! Glad to see your knocking over most of the Pwn2Own range again 🤙🏻
English
0
0
6
211
Ben
Ben@XploitBengineer·
@TheGrandPew Cheers mate 😆
English
0
0
1
125