Ramdhan

1.8K posts

Ramdhan

Ramdhan

@n0psledbyte

CTF @SuperGuesser (pwn), Security Researcher @starlabs_sg

Indonesia شامل ہوئے Temmuz 2016
793 فالونگ1.7K فالوورز
Ramdhan
Ramdhan@n0psledbyte·
@spendergrsec Correct, the main fix is the first commit you post. I think the second commit is not quite relevant
English
1
0
0
184
Brad Spengler
Brad Spengler@spendergrsec·
@n0psledbyte What's bothering me is the error handling in the first if of the loop. ctx->merge is set at the end of the loop, so either that first if handles it and continues with the next iteration, or it means ctx->merge is 0, which means the fix applied there would be a no-op.
English
2
0
1
294
Ramdhan
Ramdhan@n0psledbyte·
@spendergrsec This bug is reachable without MSG_SPLICE_PAGES. So that's means 15 years old container escape bug reachable without user namespace 😅. We use this for kernelCTF
English
2
0
1
246
Brad Spengler
Brad Spengler@spendergrsec·
Doesn't seem like the fixes tag is correct on that one though, I think it should be d3dccb0a487d065ce097e565d9ca8ae85d892a55. Should not be able to reach the bad case prior to MSG_SPLICE_PAGES support.
English
1
0
1
699
Ramdhan ری ٹویٹ کیا
TrendAI Zero Day Initiative
Nicely done! Billy (@st424204) and Ramdhan (@n0psledbyte) of STAR Labs used a UAF to perform their Docker Desktop escape and execute code on the underlying OS. They earn $60,000 and 6 Master of Pwn Points.
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
18
95
8.7K
Ramdhan ری ٹویٹ کیا
starlabs
starlabs@starlabs_sg·
Seems like the Docker Escape (CVE-2024-6222) that our team members, @st424204 ,@n0psledbyte & @tuanit96 presented at Pwn2Own is finally fixed. Great work. 👍🏼💪🏼 #4290" target="_blank" rel="nofollow noopener">docs.docker.com/desktop/releas…
English
1
9
58
10.6K
Ramdhan ری ٹویٹ کیا
Lau
Lau@notselwyn·
Exciting news! 🚀 Just dropped my blogpost unveiling the universal Linux kernel LPE PoC for CVE-2024-1086 (working on v5.14 - v6.7) used for pwning Debian, Ubuntu, and KernelCTF Mitigation instances, including novel techniques like Dirty Pagedirectory 🧵 pwning.tech/nftables
English
12
264
781
114.8K
Ramdhan ری ٹویٹ کیا
TrendAI Zero Day Initiative
Verified! The first #Docker escape at #Pwn2Own involved two bugs, including a UAF. The team from STAR Labs SG did great work in the demonstration and earned $60,000 and 6 Master of Pwn points. #P2OVancouver
TrendAI Zero Day Initiative tweet media
English
0
8
73
16K
Ramdhan ری ٹویٹ کیا
starlabs
starlabs@starlabs_sg·
We are organising a conference on 26th - 27th June 2024 Attention Speakers: Our 2024 Call for Papers is now open! #OffByOne2024? Learn all about it: offbyone.sg/cfp/
English
1
22
62
19.8K
Ramdhan ری ٹویٹ کیا
Zion Leonahenahe Basque
2024 is the year of the decompiler! Start your year off right by reading a post on the last 30 years of decompilation and one of its hardest problems: structuring! mahaloz.re/dec-history-pt1 Part 2 to be released next week.
English
8
96
270
24.7K
Ramdhan ری ٹویٹ کیا
Mr. Rc
Mr. Rc@rcx86·
during reverse engineering, whenever i see some unknown instruction the first place i go to is this page: felixcloutier.com/x86/index.html you can click on each instruction and see their psuedocode, this helps you to understand what are the steps that this instructions takes which are not obvious like how ret instructions pops the stack pointer into eip.
Mr. Rc tweet mediaMr. Rc tweet media
English
7
90
465
59.4K
Ramdhan ری ٹویٹ کیا
Yarden Shafir
Yarden Shafir@yarden_shafir·
Reminder to go ask the questions that you feel are stupid. Just fixed a problem I was stuck on for 2 days in 15 minutes because I asked all my dumb questions.
English
6
18
113
16.3K