dungnm

28 posts

dungnm

dungnm

@dungnm_

Security Researcher at @vcslab | Pwn2Own Ireland 2024

Katılım Nisan 2022
219 Takip Edilen122 Takipçiler
dungnm retweetledi
ö
ö@r0keb·
Good morning! Just published a blog post exploiting a VMware Guest To Host. A UaF Heap Feng Shui base address leakage to bypass ASLR and a stack-based buffer overflow to achieve RCE. r0keb.github.io/posts/VMware-G…
English
3
77
320
17.9K
dungnm retweetledi
Adrián Díaz
Adrián Díaz@s4dbrd·
Wrote up my first Patch Tuesday diff. CVE-2026-20811, type confusion in win32kfull.sys. CMonitorTopology* survives incomplete sanitization in the async path. Feedback welcome! s4dbrd.github.io/posts/win32k-t…
English
2
46
160
11.8K
dungnm retweetledi
Linux Kernel Security
Linux Kernel Security@linkersec·
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets Excellent article by Quang Le about exploiting CVE-2025-38617 — a race condition that leads to a use-after-free in the packet sockets implementation. blog.calif.io/p/a-race-withi…
Linux Kernel Security tweet media
English
2
23
118
6.4K
dungnm retweetledi
Calif
Calif@calif_io·
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets. A step-by-step guide to exploiting a 20-year-old bug in the Linux kernel to achieve full privilege escalation and container escape, plus a cool bug-hunting heuristic. open.substack.com/pub/calif/p/a-…
English
3
60
212
26.4K
dungnm retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
In the final part of his blog series, @tiraniddo tells the story of how a bug was introduced into a Windows API. Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process. projectzero.google/2026/02/gphfh-…
English
0
54
192
21.2K
dungnm retweetledi
blueblue
blueblue@piedpiper1616·
GitHub - oxfemale/CVE-2026-20817: Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. - github.com/oxfemale/CVE-2…
English
0
12
32
3.8K
dungnm retweetledi
AnMioLink
AnMioLink@anylink20240604·
Silverfox Group is actively exploiting CVE-2025-70795 in wild to terminate AV processes. Such driver is not in Windows vulnerable driver blocklist. The updated driver verify if the control code is from a SYSTEM Process, but still can be used. Reference: bbs.kafan.cn/thread-2288675…
AnMioLink tweet mediaAnMioLink tweet mediaAnMioLink tweet media
English
6
57
321
26.2K
dungnm retweetledi
Out of Bounds
Out of Bounds@oobs_io·
Technical analysis of the TP-Link ER605 Pre-Auth RCE exploit chain by @yibarrack. This writeup documents the reproduction of CVE-2024-5242, 5243, and 5244, detailing a 2-stage exploitation process to bypass ASLR on MIPS32 LE. Full report: oobs.io/posts/er605-1d…
English
2
25
81
6.4K
dungnm retweetledi
Daax
Daax@daaximus·
Dropping some tooling to assist with Windows RE (or any really); bulk download modules across all versions, search for call chains from references, immediates, instructions, etc. Has been useful for mass-analysis, cross-version diffing, variant analysis, and just generally locating candidates for more thorough investigation (ioctl dispatch, rpc handlers/chains, what functions eventually call a desired target). github.com/daaximus/ida-r…
English
1
46
219
15.9K
dungnm retweetledi
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
NEW BLOG: The Great VM Escape 💕 We caught threat actors deploying a VMware ESXi exploit toolkit in the wild - potentially was a zero-day developed over a year before VMware's disclosure 👀 If anyone has thoughts on it let me know, but I needed almost a full case of beer to wrap my head around this one 🍺 Full technical breakdown 👇 huntress.com/blog/esxi-vm-e…
English
25
192
794
177.7K
dungnm retweetledi
Connor McGarr
Connor McGarr@33y0re·
Starting 2026 with a new blog! I've really been enjoying my Windows on ARM machine - so my post is about interrupts for WoA. This includes x64/ARM differences, virtual interrupts, Hyper-V's synthetic controller, and Secure Kernel interrupts/intercepts connormcgarr.github.io/windows-arm64-…
English
7
72
283
24.9K