nicolas vamous

580 posts

nicolas vamous

nicolas vamous

@NVamous

Katılım Haziran 2020
233 Takip Edilen716 Takipçiler
nicolas vamous retweetledi
nicolas vamous retweetledi
Samuel Groß
Samuel Groß@5aelo·
We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojectz… It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!
English
2
74
294
24.1K
nicolas vamous retweetledi
Crusaders of Rust
Crusaders of Rust@cor_ctf·
We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸 Who would have thought you could pwn a kernel with just a 0x0000 written 262636 bytes out of bounds? Read the full writeup at: syst3mfailure.io/two-bytes-of-m… 👀
English
0
54
202
11.2K
Javier Partido Rufo
Javier Partido Rufo@javierprtd·
I need to confirm, but I think there’s another strategy to exploit a file UAF. You have to do what’s shown here gum3t.xyz/posts/a-gau-ha… but instead of spraying /etc/passwd, spray page tables (the file content, I think only comes from the buddy allocator), without cross-cache!
English
3
8
44
5.2K
nicolas vamous retweetledi
Klecko
Klecko@klecko0·
I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…
English
10
127
414
37.4K
1ce0ear
1ce0ear@1ce0ear·
S10 bug CVE-2024-44068
1ce0ear tweet media
English
4
7
78
9.9K
nicolas vamous retweetledi
nedwill
nedwill@NedWilliamson·
@mboehme_ This video is an excellent broader overview. Despite being relative obscure I find it presents some good intuitive models: youtube.com/watch?v=mQEpPN… I'm following other work related to automated proof generation such as AlphaGeometry. I can see parallels with symbolic execution.
YouTube video
YouTube
English
2
1
17
1.3K
nicolas vamous retweetledi
Javier Partido Rufo
Javier Partido Rufo@javierprtd·
I just released the blog explaining how I leveraged CVE-2022-22265 in the Samsung npu driver. Double free to achieve UAF over signalfd + cross cache + Dirty Page Table + code inject into libbase.so for execution by init. Hope you can enjoy it soez.github.io/posts/CVE-2022…
English
1
94
252
27.3K
nicolas vamous retweetledi
Mathias Payer
Mathias Payer@gannimo·
Philipp and Valentin wondered how good "safe" allocators actually are and dissected Android's scudo. We found that the zygote fork model results in unexpected bypasses for several mitigations, including the breaking the guarantees of the safe allocator. Join us tomorrow at 10:45!
USENIX WOOT Conference on Offensive Technologies@wootsecurity

... and the best paper award goes to ... "Exploiting Android’s Hardened Memory Allocator" by Philipp Mao, Elias Valentin Boschung, Marcel Busch, and Mathias Payer 🥇 Join their presentation tomorrow at the 10:45 am session 🤩

English
2
10
68
7.9K
nicolas vamous retweetledi
Linux Kernel Security
Linux Kernel Security@linkersec·
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel A paper by Lukas Maar, @notbobbytables, et al. about exploiting slab memory corruptions via a cross-allocator attack targeting user page tables. stefangast.eu/papers/slubsti…
Linux Kernel Security tweet media
English
1
24
107
6.6K
nicolas vamous retweetledi
Tielei
Tielei@WangTielei·
Looking for universal, backward-compatible kernel read and write primitives for both ARM and Intel-based macOS systems? No problem! Check it out at: github.com/wangtielei/POC…. The PoC uses only existing kernel mechanisms and does not require complex memory manipulation techniques.
English
2
41
174
31.9K