bbbig

33 posts

bbbig

bbbig

@bbbig12

Vulnerability Researcher @theori_io; Pwn2Own Vancouver 2024 Winner; DEFCON CTF 31, 32 Winner; CTF Player (Team GYG, TheDuck, MMM) ; MS at SoftSec Lab in KAIST.

Katılım Kasım 2018
106 Takip Edilen546 Takipçiler
POC_Crew
POC_Crew@POC_Crew·
#POC2024 Seunghyun Lee(@0x10n) - WebAssembly Is All You Need: Exploiting Chrome and the V8 Sandbox 10+ times with WASM 🇰🇷
POC_Crew tweet media
English
3
12
68
5.9K
bbbig retweetledi
Tim Becker
Tim Becker@tjbecker·
Thrilled to learn our (@theori_io) CRS got first place in the AIxCC Semifinal competition. For the semifinal competition, we focused on implementing simple ideas in a robust way. I'm eager to implement our more ambitious ideas for the final event next year! @sa-blog/winning-the-aixcc-qualification-round-7263d1cde9c8" target="_blank" rel="nofollow noopener">medium.com/@sa-blog/winni…
English
3
3
43
5.9K
bbbig retweetledi
Theori
Theori@theori_io·
🚨 New Linux Kernel vulnerability (CVE-2024-27394) discovered & patched by Theori! 🔗 blog.theori.io/deep-dive-into… Our researcher @v4bel at #Theori identified a critical #UAF vulnerability in TCP-AO caused by a race condition in the #RCU API. Using techniques from the ExpRace paper, we extended the race window to demonstrate its exploitability. Curious how we did it? Read our deep dive for the full details! #Theori #Cybersecurity #LinuxKernel #TCP #VulnerabilityResearch #CVE #TechBlog
English
0
41
153
35.9K
bbbig retweetledi
Theori
Theori@theori_io·
In a recent #APT simulation, #Theori uncovered 4 critical #RCE vulnerabilities in @cososys Endpoint Protector (EPP) that let us fully compromise the server & clients. Here’s a peek: 👾 CVE-2024–36072: Unauthenticated attackers can exploit a logging flaw to execute system commands with root privileges. 👾 CVE-2024–36073: With admin access, attackers can overwrite configurations and execute commands on client endpoints. 👾 CVE-2024–36074: Server access allows attackers to execute malicious files. 👾 CVE-2024–36075: Unauthenticated attackers can manipulate client configurations to potentially bypass security and achieve remote code execution. Could your server be #hacked the same way? Find out through our blog post! 👉 blog.theori.io/a-deep-dive-in…
English
1
8
29
3.3K
bbbig retweetledi
Gwangun Jung
Gwangun Jung@pr0Ln·
We posted our third writeup of N-day full chain series: Chaining N-days to Compromise All: Part 3 — Windows Driver LPE: Medium to System medium.com/theori-blog/ch…
English
2
36
101
9.8K
bbbig
bbbig@bbbig12·
@qwqbebe Our team likes to share things, so 'maybe' we could make it public. Before that, please look forward to the N-day chain blog series that will be posted soon. :)
English
0
0
4
84
Raindrop
Raindrop@qwqbebe·
@bbbig12 Are you planning on detailing it as a write-up later on?🥺🥺
English
1
0
1
154
Sunjoo Park
Sunjoo Park@grigoritchy·
Getting root of Huawei p60 pro(103.1.0.132) with 1-day kernel vulnerability. Completely locked down, an unavailable of panic logs and can't find the firmware image matching to my device were really tricky managing to.
English
5
18
158
14.3K
bbbig
bbbig@bbbig12·
@0x10n Awesome work...!!
English
0
0
0
277
bbbig retweetledi
TrendAI Zero Day Initiative
Wow! The Theori was able to exploit VMware Workstation with an additional Windows Kernel LPE vulnerability in the Virtualization category. They went from guest OS to SYSTEM on the host OS. They're off to the disclosure calls with details. #Pwn2Own
English
2
22
93
14.8K
bbbig retweetledi
bbbig retweetledi
Super Guesser
Super Guesser@SuperGuesser·
We are recruiting reversing guys. If you are interested in our team, plz mail to contact@guesser.team with your self introduction. We will review and mail back!! Thank you.
English
2
21
56
0
bbbig retweetledi
Super Guesser
Super Guesser@SuperGuesser·
we won zer0pts CTF 2021 😃😃 The challenges are really insanely hard and creative. Thank you for team zer0pts :)
Super Guesser tweet media
English
1
10
98
0