__paulch Profile Banner
PaulCh Profile
PaulCh

@__paulch

Followers
535
Following
187
Media
5
Statuses
95

Working to become a better security researcher today than I was yesterday. @BushwhackersCTF

Joined November 2014
Don't wanna be here? Send us removal request.
@__paulch
PaulCh
4 years
RT @emil_lerner: Slides from my talk "HTTP Request Smuggling via higher HTTP versions" at #phdays10!. Several previously undisclosed flaws….
0
149
0
@__paulch
PaulCh
4 years
RT @emil_lerner: I've just released the source code for at PRs are welcome :).
Tweet card summary image
github.com
Contribute to neex/1u.ms development by creating an account on GitHub.
0
38
0
@__paulch
PaulCh
4 years
Honestly, I didn’t think that the first thing you should do on the way to become a browser security researcher is installing noscript.
0
0
2
@__paulch
PaulCh
5 years
At my SAS Online 2020 workshop I will be speaking about current trends of fuzzing since they have changed a lot lately. I’ll also share my ideas on how fuzzing should be approached nowadays and how to move away from “I’ve just launched AFL and found a bug, haha”.
@TheSAScon
TheSAS2025
5 years
Give some kudos to @__paulch @trompi! - and we are done with speakers announcements!😉.
0
3
4
@__paulch
PaulCh
5 years
Seems like I have finally started a blog! . Hunting for bugs in VirtualBox (First Take) .
1
76
213
@__paulch
PaulCh
5 years
Oracle has finally patched another bug that I found in VirtualBox. I think this is the first bug that is worth writing about, so I will finally start a blog soon.
0
0
11
@__paulch
PaulCh
5 years
Своим русскоязычным фолловерам я хотел бы порекомендовать видеозаписи лекций Георгия Владимировича Курячего на канале UNИX. За годы обучения в университете из его лекций я узнал больше интересного, чем из всех обязательных курсов вместе взятых.
1
0
11
@__paulch
PaulCh
5 years
While patch-diffing VirtualBox: wow, those E1000 emulator bugs are still a thing. There was a bug, which could allow attack to position CSE register (position to stop computing checksum) after the end of real packet
Tweet media one
1
0
6
@__paulch
PaulCh
5 years
One sleepless weekend of fuzzing and code review and I managed to find my first two vulnerabilities in VirtualBox: CVE-2020-2929 and CVE-2020-2951! Also my first bug collision ever. Credit to @vishnudevtj for also finding CVE-2020-2929!.
0
0
30
@__paulch
PaulCh
5 years
One way to learn about particular fuzzing engine is to look at its test cases. I find it really amazing that libfuzzer can do things like this one:
0
0
1
@__paulch
PaulCh
5 years
I sit near a window at work. Through it I can see a huge construction site, which makes me think each time I look outside: "These guys have almost built three giant buildings, while I sit here. What have I done during all that time? Does it have any value comparing to *this*?".
0
0
5
@__paulch
PaulCh
6 years
Исследование уязвимости порчи памяти в VNC. Отчёт на русском [en] Russian version of report is already published.
0
0
1
@__paulch
PaulCh
6 years
Also, I would like to mention that some vulnerabilities where very similar and some were migrating from one project to another, because of copy-pasting GPL code. We really need to find a way to find those variants of vulnerabilities.
0
0
2
@__paulch
PaulCh
6 years
I don’t act like I found all the memory corruption bugs in VNC products, but I hope my work was at least a drop in the ocean on the way to secure world of open source products.
1
0
2
@__paulch
PaulCh
6 years
After my talk a weird guy appeared from the crowd and said, that I didn’t find ALL vulnerabilities. So there still some space for YOUR research.
1
0
2
@__paulch
PaulCh
6 years
Today at @ZeroNights I presented research about memory corruption vulnerabilities in VNC. Full report in English will be available at on the 22-th of November.
1
8
20
@__paulch
PaulCh
6 years
If you are going to ZN this year, visiting this talk is a must.
@ZeroNights
ZeroNights
6 years
Emil Lerner : "Single byte write to RCE: exploiting a bug in php-fpm" #ZeroNights 2019.
0
3
9
@__paulch
PaulCh
6 years
I have just published a blog post about solving "Master of PHP challenge" from Read World CTF 2019. This solution doesn't care about a bug implanted into PHP. We exploit curl 1-day instead!
blog.bushwhackers.ru
In our previous blog post, my teammate Emil has already published a solution for Master of PHP, however, I still want to share another way of solving this challenge, because I think it is quite...
0
52
123
@__paulch
PaulCh
6 years
The more I think about it, the more depressed I become. Without libfuzzer, afl and ASan I wouldn't be able to find and identify vulnerabilities so quickly. So, probably, these projects deserve more credit, than security researcher who used them does.
0
0
6