piers Profile
piers

@_piers2

Followers
580
Following
80
Media
0
Statuses
27

At @starlabs_sg

Joined March 2022
Don't wanna be here? Send us removal request.
@_piers2
piers
2 years
Thankfully I was still able to find something ๐Ÿ˜–
@thezdi
Trend Zero Day Initiative
2 years
Validated! Dungdm (@_piers2) of Viettel Cyber Security used two bugs, include the ever risky race condition, to exploit #Oracle VirtualBox. As a round 3 winner, they receive $20,000 and 4 Master of Pwn points. #Pwn2Own #P2OVancouver
4
3
74
@_piers2
piers
2 years
Hopefully I will qualify
@acsc_asia
Asian Cyber Security Challenge (ACSC)
2 years
๐Ÿš€ ACSC 2024 (Asian Cyber Security Challenge) is Happening!๐Ÿš€ ๐Ÿ“… March 30-31, 2024 ๐ŸŒŸ Mark your calendars! ๐Ÿ”œ Registration opening soon. Don't miss out! More details here โ–ถ๏ธ https://t.co/TmZFSjOgx8 #ACSC2024 #CyberSecurity #SaveTheDate
2
0
6
@_piers2
piers
2 years
In Vmware Workstation 17.5.1, a bug was silently patched, I was going to use it for Pwn2Own but i think that I probably found the same bug that was used in TFC 2023... :( @vv474172261, is there a way i can confirm this with you ?
2
2
32
@Synacktiv
Synacktiv
2 years
Slides of our latest talks during #GreHack23 and @codeblue_jp are now available on our website! https://t.co/z9jtXbLcjl
Tweet card summary image
synacktiv.com
Synacktiv
0
16
90
@moyix
Brendan Dolan-Gavitt
2 years
Will still try to do a blog post on my @CSAW_NYUTandon CTF challenge, NERV Center, but for now here's a thread explaining the key mechanics. I put a lot of work into the aesthetics, like this easter egg credit sequence (all ANSI colors+unicode text) that contains key hints:
9
35
134
@Kharosx0
Christopher
2 years
- Writes shitty Hypervisor fuzzer as an example for someone junior - Runs shitty fuzzer against VirtualBox - Finds 0-day... It was a few hours of effort? In an attack surface that already had a 0-day a bit ago? Incoming blog for fun ๐Ÿ™ƒ
5
12
198
@_piers2
piers
2 years
got hard carried by amazing teammates at @vcslab
@thezdi
Trend Zero Day Initiative
2 years
That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Viettel (@vcslab) for winning Master of Pwn with $180K and 30 points. We'll see you at Pwn2Own Automotive in Tokyo next January.
0
0
38
@ExLuck99
Cรดng Thร nh Nguyแป…n
2 years
Nice play. #Pwn2Own #Xiaomi13Pro
0
2
10
@thezdi
Trend Zero Day Initiative
2 years
Success! Team Viettel was able to execute an OOB write against the Sonos Era 100. They earn $30,000 and 6 Master of Pwn points. #Pwn2Own
2
7
84
@hackyboiz
hackyboiz
2 years
Research] NewJeans' Hyper-V Part 2 - CVE-2018-0959 Analysis(1) Part 1์—์„œ ๋‹ค๋ฃฌ Hyper-V ์•„ํ‚คํ…์ฒ˜์— ์ด์–ด Part 2์—๋Š” CVE-2018-0959์„ ๋ถ„์„ํ•œ ๋‚ด์šฉ์„ ๋‹ด์•˜์Šต๋‹ˆ๋‹ค! ์ด๋ฒˆ์—” ์ฝ”๋“œ๊ฐ€ ์ข€ ๋งŽ์œผ๋‹ˆ ๊ธด์žฅํ•˜๋ผ๊ตฌ?... https://t.co/D34SvJKXw1
Tweet card summary image
hackyboiz.github.io
์ง€๋‚œ ํŒŒํŠธ ๋ณด๋Ÿฌ๊ฐ€๊ธฐ [Research] NewJeansโ€™ Hyper-V Part 1 - Hyper-V Architecture [Research] NewJeansโ€™ Hyper-V Part 2 - CVE-2018-0959 Analysis(1) (Here) ์•ˆ๋…•ํ•˜์„ธ์š”! ์ผ์ฃผ์ผ ๋งŒ์— ๋Œ์•„์˜จ pwndorei์ž…๋‹ˆ๋‹ค. ์ง€๋‚œ Part 1์—์„œ๋Š” Hyper-V ์•„ํ‚คํ…์ฒ˜์—...
0
16
41
@thezdi
Trend Zero Day Initiative
3 years
Success! dungdm (@_piers2) of Team Viettel (@vcslab) used an uninitialized variable and a UAF bug to exploit Oracle VirtualBox. They earn $40,000 and 4 Master of Pwn points. #Pwn2Own #P2OVancouver
0
10
66