bbbig
33 posts

bbbig
@bbbig12
Vulnerability Researcher @theori_io; Pwn2Own Vancouver 2024 Winner; DEFCON CTF 31, 32 Winner; CTF Player (Team GYG, TheDuck, MMM) ; MS at SoftSec Lab in KAIST.

We’ve just published Angelboy’s (@scwuaptx) latest deep dive into Windows Kernel vulnerabilities, fresh off the stage from #Hexacon! Don’t miss out on the cutting-edge insights and findings. Check it out here: devco.re/blog/2024/10/0… #MSRC #VulnerailibtyResearch

Guest Revolution: Our Story of Compromising the Host Kernel from the VMware Guest by @bbbig12 & @pr0Ln #HEXACON2024






Successfully exploited a 0-day vulnerability in KernelCTF! work with @v4bel 🎉




Confirmed! Gwangun Jung (@pr0ln) and Junoh Lee (@bbbig12) from Theori (@theori_io) combined three different bugs to escape #VMware Workstation and then execute code as SYSTEM on the host OS. This impressive feat earns them $130,000 and 13 Master of Pwn points. #Pwn2Own

Confirmed! Seunghyun Lee (@0x10n) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own


Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE : CVE-2023-3079 • Chrome Sandbox Escape : CVE-2023-21674 • LPE in guest OS : CVE-2023-29360 • VMware Info Leak : CVE-2023-34044 • VMware Escape : CVE-2023-20869 • LPE in host OS : CVE-2023-36802





