fluoroacetate Profile
fluoroacetate

@fluoroacetate

Followers
4K
Following
0
Media
0
Statuses
25

Joined October 2018
Don't wanna be here? Send us removal request.
@fluoroacetate
fluoroacetate
5 years
RT @thezdi: That's a wrap! #Pwn2Own 2020 officially comes to a close. We're happy to award the @fluoroacetate duo the title of Master of Pw….
0
17
0
@fluoroacetate
fluoroacetate
5 years
RT @thezdi: Confirmed! The @fluoroacetate duo used a pair of UAFs - one in #Adobe and one in the #Windows kernel to take over the target sy….
0
7
0
@fluoroacetate
fluoroacetate
5 years
RT @thezdi: Confirmed! The @fluoroacetate duo leveraged a UAF in #Windows to escalate to Administrator. Their first attempt in repeating as….
0
5
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: That brings #Pwn2Own Tokyo 2019 to a close. Congrats to @fluoroacetate on successfully defending their Master of Pwn title. In….
0
43
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Success! The prolific @fluoroacetate duo was able to get a shell on the router. They're headed back to the disclosure room to p….
0
2
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Success! The @fluoroacetate duo got the #Samsung Galaxy S10 to connect to their rogue base station and then pushed a file to th….
0
29
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The @fluoroacetate duo used a bug in JavaScript JIT followed by a UAF to escape the sandbox to grab a pic off a #Sam….
0
36
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The @fluoroacetate duo used a JavaScript bug that jumped the stack to exfiltrate a picture from the #Xiaomi Mi9. The….
0
11
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Success! It took two attempts, but the @fluoroacetate duo were able to demonstrate their exploit of the #Samsung Q60 television….
0
10
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Success! The @fluoroacetate duo successfully demonstrated their exploit against the #Amazon #Echo Show. They're back to the dis….
0
14
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The @fluoroacetate duo used a Javascript OOB Read bug to exploit the built-in browser to get a bind shell from the #….
0
26
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: That's a wrap! Congrats to @fluoroacetate on winning Master of Pwn. There total was $375,000 (plus a vehicle) for the week. Sup….
0
257
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The @fluoroacitate duo used a JIT bug in the renderer to win $35,000 and a Model 3. What a great way to kick off the….
0
44
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: The @fluoroacetate duo does it again. They used a type confusion in #Edge, a race condition in the kernel, then an out-of-bound….
0
211
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Wow. Just wow. Starting from a web browser within a virtual client and ending with code execution on the host OS. Now off to th….
0
68
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The duo from @fluoroacetate used a JIT bug in #Firefox and an out-of-bounds write in the #Windows kernel to earn the….
0
35
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! @fluoroacetate leveraged a race condition leading to an out-of-bounds write to escalate from a #VMware client to exe….
0
81
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The @fluoroacetate team used an integer underflow and a race condition to escape the virtual machine and pop calc on….
0
21
0
@fluoroacetate
fluoroacetate
6 years
RT @thezdi: Confirmed! The team of @fluoroacetate used an integer overflow in JIT and a heap overflow to escape the sandbox. The successful….
0
55
0
@fluoroacetate
fluoroacetate
7 years
RT @thezdi: That brings to an end #Pwn2Own Tokyo 2018! Congrats to team @fluoroacetate on earning 45 points and being crowned Master of Pwn….
0
46
0