REverse_Tactics Profile
REverse_Tactics

@Reverse_Tactics

Followers
796
Following
6
Media
8
Statuses
32

Software reverse engineering & vulnerability discovery company.

Paris, France
Joined May 2022
Don't wanna be here? Send us removal request.
@Reverse_Tactics
REverse_Tactics
5 months
📢 We're excited to announce our complete training catalog is now live at !.Next up: "Bug Hunting In Hypervisors" at @reconmtl Register here:
0
1
9
@Reverse_Tactics
REverse_Tactics
3 months
Slides and video of our talk at @offensive_con are already online !.Thanks to @Binary_Gecko for the amazing event.
0
12
31
@Reverse_Tactics
REverse_Tactics
4 months
@OnlyTheDuck will also be in @typhooncon in a few weeks to present the second part of the part of our "journey to freedom !"
Tweet media one
0
1
2
@Reverse_Tactics
REverse_Tactics
4 months
And that's a wrap for @offensive_con and #Pwn2Own ! We had the best time there and were so glad to reunite with the finest researchers out there. See you next year !.
@offensive_con
offensivecon
4 months
"Journey to Freedom: Escaping from VirtualBox" by @BrunoPujos and @OnlyTheDuck
Tweet media one
1
2
14
@Reverse_Tactics
REverse_Tactics
4 months
#Pwn2Own went well for us ! If you are interested in learning about attacking hypervisors, sign up for our incoming training at @reconmtl !
@thezdi
Trend Zero Day Initiative
4 months
Sweet! Corentin BAYET (@OnlyTheDuck) from @Reverse_Tactics barely needed a second to demonstrate his exploit against VMware ESXi. He heads off to the disclosure room to provide the details of his work. #Pwn2Own #P2OBerlin
Tweet media one
0
0
12
@Reverse_Tactics
REverse_Tactics
4 months
RT @thezdi: A successful collision! Corentin BAYET (@OnlyTheDuck) from @Reverse_Tactics used 2 bugs to exploit ESXi, but the Use of Uniniti….
0
7
0
@Reverse_Tactics
REverse_Tactics
4 months
It's time for @offensive_con and #Pwn2Own ! Come meet us there and and attend our sessions:. 📅 Fri, May 16 @ 18:45 — Our talk “Journey to Freedom” about escaping VirtualBox during Pwn2Own 2024.📅 Sat, May 17 @ 14:00 — Watch our live VMware ESXi escape attempt ar #Pwn2Own.
0
2
9
@Reverse_Tactics
REverse_Tactics
4 months
Our talk "Journey to Freedom" about our Pwn2Own 2024 VirtualBox escape is coming to @offensive_con ! We will dive deeper into the technical challenges and obstacles we faced. @OnlyTheDuck will break down the key research phases and the exploit's most critical components.
@offensive_con
offensivecon
4 months
2025 agenda is out!.
Tweet media one
0
2
9
@Reverse_Tactics
REverse_Tactics
6 months
Excited to announce our talk at #TyphoonCon2025: "Journey to freedom"! @OnlyTheDuck will share how we escaped VirtualBox and chained it to Windows kernel LPE at #Pwn2Own 2024. Expect a story-driven session filled with insights from the high-stakes environment of #Pwn2Own !.
@typhooncon
TyphoonCon🌪️
6 months
🌪️ Speaker Announcement!. Excited to welcome @OnlyTheDuck to the #TyphoonCon2025 Conference lineup!.Join us in Seoul on May 29-30:
Tweet media one
0
2
15
@Reverse_Tactics
REverse_Tactics
6 months
Could not dream of a better advertisement for our training "Bug Hunting in Hypervisors" at @reconmtl ! Students will be expected to (almost) do this in one day 😉.More details:
@SinSinology
SinSinology
6 months
it took me so much time to finish this exploit but I finally did it! my first guest-to-host virtualbox escape is finally ready, using a combination of 2 bugs I can target the latest version :).Eternal thank you to my dear friend Corentin @OnlyTheDuck for constantly encouraging me
0
4
39
@Reverse_Tactics
REverse_Tactics
7 months
For the first time, our training "Bug Hunting in Hypervisors" is open to the public at @reconmtl !.Designed for security researchers,we will dive into VM escapes, hypervisor attack surfaces, and real-world exploitation. More info:
0
5
23
@Reverse_Tactics
REverse_Tactics
9 months
Slides & video from our @GrehackConf talk "Attacking Hypervisors - A Practical Case" are online! Learn how we exploited vulnerabilities to escape VirtualBox during Pwn2Own Vancouver 2024:
0
27
59
@Reverse_Tactics
REverse_Tactics
10 months
Join us live at @GrehackConf for @OnlyTheDuck's talk "Attacking Hypervisors : A practical case" at 4PM (paris time)!
0
4
8
@Reverse_Tactics
REverse_Tactics
10 months
Ready for @GrehackConf ! This Friday, catch @OnlyTheDuck's talk "Attacking Hypervisors: A practical case". If you're attending, Last year's talk is a must-read for background on hypervisor security. Check it out here :
0
4
19
@Reverse_Tactics
REverse_Tactics
10 months
With so many variables in chained exploits and unknown network setups, anything can happen—but we’re thrilled that our tactics worked flawlessly in under 15 seconds across two different devices at #Pwn2Own.
@thezdi
Trend Zero Day Initiative
10 months
We have a collision in the SOHO Smashup. Corentin BAYET (@OnlyTheDuck) of @Reverse_Tactics used three bugs to go from the QNAP QHora-322 to the QNAP TS-464, but 1 had been previously seen in the contest. He still earns $41,750 and 8.5 Master of Pwn points. #Pwn2Own #P2OIreland
Tweet media one
0
0
4
@Reverse_Tactics
REverse_Tactics
10 months
Live from Cork for #Pwn2Own Ireland! Tomorrow at 3PM (Cork time), we will exploit 3 vulnerabilities to compromise both the QNAP QHora322 router and TS-464 NAS in a SOHO smashup. Stay tuned !.
0
0
5
@Reverse_Tactics
REverse_Tactics
1 year
For french readers, we also authored an article titled "Sécurité des hyperviseurs" in the latest issue of MISC N°135, where we explore attack surfaces and virtual machine escape scenarios along with known and previously exploited vulnerabilities:
Tweet media one
@MISCRedac
MISCmag
1 year
Notre nouveau numéro s'intéresse entre autres à la sécurité des #hyperviseurs : retrouvez-le désormais en kiosque & sur pour profiter des ports offerts ou de la lecture en ligne immédiate !
Tweet media one
0
1
3
@Reverse_Tactics
REverse_Tactics
1 year
Tickets will be on sales tomorrow at 10AM on ! Make sure to grab one and check @OnlyTheDuck last year's talk that introduce all you need to know:
1
4
3
@Reverse_Tactics
REverse_Tactics
1 year
Are you curious about the vulnerabilities we used against @virtualbox at #Pwn2Own earlier this year ? We will be at @GrehackConf to talk about it !.Following up on last year's talk, @OnlyTheDuck will present tools and techniques to find and exploit vulnerabilities in hypervisors.
@GrehackConf
GreHack
1 year
📢 #GreHack24 program release day 2!. 👤 Corentin Bayet @OnlyTheDuck, for the second time . ➡️ Attacking hypervisors - A practical case. See you tomorrow 🔥.
1
6
11
@Reverse_Tactics
REverse_Tactics
1 year
We are planning to publish more details on the exploit later. In the meantime, make sure to check the other vulnerabilities used at #Pwn2Own on @TheZDIBugs , exploited by other awesome researchers and teams:.@_manfp @carrot_c4k3 @chompie1337 @theori_io @Synacktiv @starlabs_sg.
0
1
8