Công Thành Nguyễn
32 posts

Công Thành Nguyễn
@ExLuck99
Pwner, gacha player and meme maker.
Hanoi, Vietnam Katılım Kasım 2021
211 Takip Edilen459 Takipçiler
Công Thành Nguyễn retweetledi

@bl4sty Just whitepaper stuff. They want more details about the bug.
English
Công Thành Nguyễn retweetledi

Confirmed! ChatGPT helped Team ANHTUD as they used 3 bugs - 1 collision, 1 unique SSRF and 1 cleartext storage of sensitive information - to exploit Home Automation Green. They finished with just 45 seconds remaining. Their work earns them $16,750 and 3.75 Master of Pwn points. #Pwn2Own


English
Công Thành Nguyễn retweetledi

Blog for ToolShell
Disclaimer: The content of this blog is provided for educational and informational purposes only.
blog.viettelcybersecurity.com/sharepoint-too…
#SharePoint #ToolShell

English
Công Thành Nguyễn retweetledi
Công Thành Nguyễn retweetledi

Confirmed! We were definitely thrilled to see @ExLuck99 and @greengrass19000 of ANHTUD use a command injection bug to exploit the Alpine IVI and leave us a special message. Their round 2 win earns them $10,000 and 2 Master of Pwn points. #P2OAuto


English

Thanks you and good luck.
Compass Security@compasssecurity
The #Pwn2Own schedule is out. Compass folks will show off their exploit Thursday, January 23th, 10:00 Swiss time (CET). Also wishing @_moradek_, @moe_hw, @konatabrk, @vcslab, @EQSTLab, @kiddo_pwn, @ExLuck99, @nyanctl, @SinSinology, @SummoningTeam success in pwning the Alpine IVI.
English


Boom! ExLuck (@pivik_) finishes Day One with a successful exploit of the #Ubiquiti AI Bullet camera. He heads off to the final disclosure of the day. #Pwn2Own #P2OIreland
English
Công Thành Nguyễn retweetledi
Công Thành Nguyễn retweetledi

Collision – ANHTUD was able to execute a 2-bug chain against the TP-Link Omada Gigabit Router and the Canon imageCLASS MF753Cdw for the SOHO Smashup. However, one of the bugs he used was previously known. He still earns $31,250 and 6.25 Master of Pwn points. #Pwn2Own

English
Công Thành Nguyễn retweetledi

Success! Team Viettel (@hoangnx99, @vudq16, @biennd279, @_q5ca from @vcslab) were able to execute a single-bug attack against the Xiaomi 13 Pro. They earn $40,000 and 4 Master of Pwn points. #Pwn2Own


English
Công Thành Nguyễn retweetledi

Sometimes bug disclosures go smoothly. Then there are other times. @dustin_childs discusses some of the adventures in vulnerability disclosure in his latest blog. zerodayinitiative.com/blog/2023/6/7/…
English
Công Thành Nguyễn retweetledi

A long day with so many emotions. Nearly failed in the morning. Found the solution at noon. Another vendor problem in the afternoon. Fix it at night. Finally success. Keep trying util the last minute. Thanks for our team 👍👍👍
TrendAI Zero Day Initiative@thezdi
#P2OVancouver Day 2 Highlights – Team Viettel (@vcslab) uses a 2-bug chain against Microsoft Teams. #Pwn2Own
English
Công Thành Nguyễn retweetledi

apk.sh: makes reverse engineering Android apps easier securityonline.info/apk-sh-makes-r…
English











