Brian Gorenc
@MaliciousInput
Followers
3K
Following
677
Media
17
Statuses
519
Leader of the Zero Day Initiative. Pwn2Own organizer and adjudicator. Trafficker of export-controlled intrusion software. Bug Hunter.
Austin, Tx
Joined May 2010
Huge thanks for the keynote 💙 It was fantastic. Brian Gorenc (@MaliciousInput) – From Buffer Overflows to Breaking AI: Two Decades of ZDI Vulnerability Research 🎤 #POC2025
0
6
53
Announcing #Pwn2Own Ireland! Our fall contest is on the move (again) as we head to Cork, Ireland. We also welcome @Meta as a sponsor with #WhatsApp being a target at $300K. Plus the return of the SOHO Smashup. Read all the details at https://t.co/kZvILTJtr8
#P2OIreland
zerodayinitiative.com
If you just want to read the rules, you can find them here . Â Over the last few years, our consumer-focused Pwn2Own event took place in the Trend Micro office in Toronto. However, that office...
4
45
203
Congratulations to our MSRC 2023 Most Valuable Researchers! Thank you to all the researchers who have helped secure our customers. 👏🎉 Check out our blog for the full list: https://t.co/osQbhevSq5
1
5
26
Recapping #Pwn2Own Vancouver 2023. We had an amazing contest and awarded over $1 million (plus a Tesla Model 3) for 27 unique 0-days. Join ZDI's @MaliciousInput and @dustin_childs as they go through all the highlights of this year's event. https://t.co/ASK9Z6Q1eR
1
14
69
Since no one from the MSRC is here at #Pwn2Own, we're disclosing the Teams exploit over a Teams call. You can join us if you want to hear the details:
6
15
65
CONFIRMED! @Synacktiv used a heap overflow & an OOB write to exploit the Infotainment system on the Tesla. When they gave us the details, we determined they actually qualified for a Tier 2 award! They win $250,000 and 25 Master of Pwn points. 1st ever Tier 2 award. Stellar work!
6
117
480
This year at #BHUSA, @MaliciousInput & @dustin_childs present “Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories” - A look at how enterprises can estimate risk in an era where patches aren't what they used to be.
0
6
19
The @Synacktiv team shows off their remote exploit of the #Tesla Model 3. Earlier today, this research earned them $75,000 during #Pwn2Own.
7
87
251
Happy to sponsor and look forward to attending.
Thank you @TrendMicro and @thezdi for supporting #OffensiveCon22 as gold sponsors! https://t.co/texUG1Kn6m
0
4
30
Thank you @TrendMicro and @thezdi for supporting #OffensiveCon22 as gold sponsors! https://t.co/texUG1Kn6m
0
3
14
An analysis of a #Parallels #Desktop stack clash vulnerabilities. @renorobertr describes some recently patched bugs and looks at how Binary Ninja’s static data flow capability can be used in automating bug finding tasks.
zerodayinitiative.com
Parallels Desktop uses a paravirtual PCI device called the “Parallels ToolGate” for communication between guest and host OS. This device is identified by Vendor ID 0x1AB8 and Device ID 0x4000 in a...
0
41
101
Announcing #Pwn2Own Austin! Our fall contest includes phones, printers, NAS devices and more. More than $500,000 USD in cash and prizes are available as 22 different devices will be put to the test. Read all of the details at
zerodayinitiative.com
If you just want to read the rules, you can find them here . Since its inception, our Fall Pwn2Own contest has focused on consumer devices – even as the contest itself has wandered around the world....
3
51
119
We’re supporting community #security research by partnering with @thezdi for this year’s #Pwn2Own competition – check out the details and get involved here:
zerodayinitiative.com
This year marks the 14th anniversary of Pwn2Own, which has grown from a small, browser-focused event to become one of the most well-known security contests in the industry, with millions of dollars...
0
9
20
CVE-2021-27076: A complex bug that leads to reliable code execution. @HexKitchen details this replay-style deserialization attack against #Microsoft #SharePoint. As a reminder, we're paying $50k for SharePoint exploits at #Pwn2Own.
zerodayinitiative.com
An attacker is frequently in the position of having to find a technique to evade some data integrity measure implemented by a target. One instructive example of a data integrity measure is a message...
0
51
108
For everyone finding variants while analyzing the in-the-wild #Exchange bugs, remember they are worth $200K at the upcoming #Pwn2Own contest. Bugs reported at the event have a 90-day disclosure timeline. Remember, no more patch Tuesdays before the contest.
zerodayinitiative.com
This year marks the 14th anniversary of Pwn2Own, which has grown from a small, browser-focused event to become one of the most well-known security contests in the industry, with millions of dollars...
0
16
35
A successful #VMware #ESXi demo at #Pwn2Own is worth $150K. @_wmliang_ had 2 unauth RCEs in ESXi patched last week. Not only does he break down the details in his latest blog, he went further & wrote a full code execution exploit for one of the bugs.
zerodayinitiative.com
Last fall, I reported two critical-rated, pre-authentication remote code execution vulnerabilities in the VMware ESXi platform. Both of them reside within the same component, the Service Location...
0
86
163