Chocologicall Profile Banner
Jia Hao Profile
Jia Hao

@Chocologicall

Followers
512
Following
998
Media
1
Statuses
749

Patience is a virtue. Every puzzle has an answer. | Opinions expressed are of my own.

Joined July 2012
Don't wanna be here? Send us removal request.
@starlabs_sg
starlabs
1 year
As promised, we are releasing the source code & writeup for the #OffByOneConf badge 1 month after the event, allowing interested participants the opportunity to explore it. Thanks largely to Manzel, other team members & interns who help to make it happen. https://t.co/t6HUrOa5Ay
Tweet card summary image
starlabs.sg
Introduction As promised, we are releasing the firmware and this post for the Off-By-One badge about one month after the event, allowing interested participants the opportunity to explore it. If...
0
19
56
@Creastery
Ngo Wei Lin
2 years
Check out my write-up on a seemingly harmless and limited send() in GitHub (CVE-2024-0200) and how it could be used to obtain environment variables from a production container and to achieve remote code execution in GitHub Enterprise Server: https://t.co/jmjTTOxEGY
Tweet card summary image
starlabs.sg
Earlier this year, in mid-January, you might have come across this security announcement by GitHub. In this article, I will unveil the shocking story of how I discovered CVE-2024-0200, a deceptively...
5
84
241
@starlabs_sg
starlabs
2 years
Route to Safety: Navigating Router Pitfalls is the swansong from @daniellimws https://t.co/QOqAkOhHMz We hope everyone enjoyed his informative post and wish him all the best in his future endeavours.
Tweet card summary image
starlabs.sg
Introduction Wi-Fi routers have always been an attractive target for attackers. When taken over, an attacker may gain access to a victim’s internal network or sensitive data. Additionally, there has...
2
29
61
@starlabs_sg
starlabs
2 years
We are organising a conference on 26th - 27th June 2024 Attention Speakers: Our 2024 Call for Papers is now open! #OffByOne2024? Learn all about it: https://t.co/hsUZ23yYVw
2
22
62
@offbyoneconf
Off-By-One Conference
2 years
Off-by-One 2024 Conference CFP is now opened! Be part of a historical event and shape the future of offensive security in this region. Submission and speaker benefits https://t.co/96khe0PVR2 If you like to talk to us, drop us a line at info@offbyone.sg
0
18
33
@starlabs_sg
starlabs
2 years
Great to see that some of the bugs that we reported to ICS vendors had been fixed. Thanks to @Peterpan980927 & @CurseRed for CVE-2023-6358 https://t.co/UXcdapQgrR And @testanull for CVE-2023-39474 https://t.co/WHEQ4gjQjL More to come soon.
industrial.softing.com
1
7
31
@starlabs_sg
starlabs
2 years
Our team members have spotted another fake account imposing as our team member. This is the fake account: https://t.co/djZSgc7SeE This one belongs to our team member. https://t.co/6UeyOfZuCe
1
7
14
@starlabs_sg
starlabs
2 years
9 Bug reports, 8 CVEs, 7+ months to get these advisories public. Our team member, @CurseRed & (former) intern, @junr0n found multiple vulnerabilities in Bitrix24 (after spending 1month on it) Please read the technical details in the security advisories:
3
3
44
@starlabs_sg
starlabs
2 years
Awesome work by our team members @testanull @hi_im_d4rkn3ss @linhlhq @tuanit96 & @st424204 for their successful entries https://t.co/TjzpIApRZR https://t.co/er1h4sTAv1 Not forgetting the rest of our team members who attempted to find bugs for P2O amid a hectic schedule
@thezdi
Trend Zero Day Initiative
2 years
Success! STAR Labs SG was able to execute a 2-bug chain including directory traversal and command injection against the QNAP TS-464. They earn $20,000 and 4 Master of Pwn points. #Pwn2Own
1
8
55
@starlabs_sg
starlabs
2 years
Our team member, @Creastery , & our former intern, @oceankex, prepared this some time ago. "Analysis of NodeBB Account Takeover Vulnerability (CVE-2022-46164)" https://t.co/XEEzSmFANT While writing this, they found another bug https://t.co/bUK1KEJNqh We hope you enjoy it
Tweet card summary image
starlabs.sg
Summary: Product NodeBB Vendor NodeBB Severity High - Unprivileged attackers are able to cause NodeBB to crash and exit permanently Affected Versions < v2.8.11 (Commit 82f0efb) Tested Versions v2.8.9...
0
8
52
@mdisec
Mehmet INCE
2 years
Awesome research !! 🤘❤️ This remind me a research that I've done 6 years ago on the Trend Micro product family. I specially focused on these PHP bugs👇 https://t.co/21mPqPRcNS
@Chocologicall
Jia Hao
2 years
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️‍♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
1
2
19
@Chocologicall
Jia Hao
2 years
I've finally published the advisories regarding the Trend Micro bugs that I shared at #HITCON! Do check them out at @starlabs_sg's advisory page: https://t.co/kKLXy8oQKa 🏌️‍♂️CVE-2023-32530 is an interesting case of SQLi to RCE:
Tweet card summary image
starlabs.sg
Summary: Product Trend Micro Apex Central 2019 Vendor Trend Micro Severity High Affected Versions Apex Central 2019 Build <= 6016 Tested Version(s) Apex Central 2019 Build 6016 CVE Identifier...
0
41
165
@starlabs_sg
starlabs
2 years
We have just uploaded the slides by @Chocologicall https://t.co/igHiI9rVOA and by @CurseRed https://t.co/6GK4Opcrha Thanks a lot to @HacksInTaiwan for organising a fantastic conference and our team members are truly honored to participate in it.
0
19
50
@Chocologicall
Jia Hao
2 years
Looking forward for the next 2 days! #HITCON
0
0
4
@Chocologicall
Jia Hao
2 years
Excited to share my findings with all :)
@starlabs_sg
starlabs
2 years
Looking forward to the look by our team member @Chocologicall
0
0
5
@starlabs_sg
starlabs
2 years
These bugs are found by our former team member, @PTDuy but it took us a long time/process. We pluck up our courage and ask @minliangtan via FB. Mr Tan replied us instantly & directed us to Razer's security team. We are forever greatly to Mr Tan https://t.co/YX8VUnXuGL
0
12
34
@Chocologicall
Jia Hao
3 years
🤩
@TheZDIBugs
TheZDIBugs
3 years
[ZDI-23-587|CVE-2023-32523] Trend Micro Mobile Security for Enterprises widget WFUser Authentication Bypass Vulnerability (CVSS 9.8: Credit: Poh Jia Hao of STAR Labs SG Pte. Ltd.)
0
1
8