jgrusko Profile Banner
w0 Profile
w0

@jgrusko

Followers
4K
Following
3K
Media
12
Statuses
3K

Security researcher @Apple

Joined August 2010
Don't wanna be here? Send us removal request.
@AndrewOliveau
Andrew Oliveau
2 years
💥BOOM!💥 Another privilege escalation blog, this time showcasing how to convert arbitrary file deletions 🗑️ to SYSTEM command prompt🌈 CVE-2023-27470. Learn about TOCTOU, pseudo-symlinks, MSI rollback exploits, and, of course, how to protect yourselves! https://t.co/S3HCXdvoBY
Tweet card summary image
cloud.google.com
8
202
516
@ret2systems
RET2 Systems
2 years
Hello.. is this thing still on? It's 2023, so here's a fun new blogpost on how we used Intel's x86 CPU JTAG to dump the infamous "secret bootrom" in Microsoft's original Xbox: https://t.co/p8Z2Fzab1K
12
150
424
@crypt0ad
Kostya Kortchinsky
2 years
Enhancing Chromium’s Memory Safety with Armv9 --
0
13
41
@flat_z
Aleksei Kulaev
2 years
finally... hello, PS5 PSP :)
131
245
2K
@mdowd
mdowd
2 years
Me, starting to analyze a new piece of software: I basically know how this works already, I just need to learn a few of the finer details Me, a week later: I don't know anything about this software, or computers in general.
6
76
504
@halvarflake
Halvar Flake
2 years
A rowhammer-style but different (and worse?) mechanism to induce DRAM bit flips. Get popcorn.
8
18
97
@bluefrostsec
Blue Frost Security
2 years
CVE-2023-2008 - Analyzing and exploiting a bug in the udmabuf driver by @dialluvioso_ and @esanfelix
0
51
128
@jgrusko
w0
2 years
I can finally have closure and peace of mind
@bluefrostsec
Blue Frost Security
2 years
We've been asked to share the kernel challenge we had at OffensiveCon. You can download it at https://t.co/gV6YQvU4SD and give it a try. It was meant to be solved live at the conference, but apparently the noisy environment and german keyboard layout made it too hard :').
0
2
11
@Dinosn
Nicolas Krassas
3 years
Driver adventures for a 1999 webcam
Tweet card summary image
blog.benjojo.co.uk
0
4
10
@Externalist
Ahn Ki Chan
3 years
Here are the slides for my keynote, 'Mobile Exploitation, the past, present, and the future' at #Zer0Con2023. Zer0con was a blast as always, thank you @POC_Crew!! 🚀💫 https://t.co/cqEftba9Cy
12
139
420
@maddiestone
Maddie Stone
3 years
✨Amazing detection and analysis by @_clem1 and Google TAG on 2 different campaigns using 5 different 0-days and numerous n-days. Android, iOS, and Samsung devices were targeted https://t.co/CTuZoweYbb
1
31
106
@ortegaalfredo
AIfredo 0rtega
3 years
"a software engineer and user of 4chan."
4
5
53
@Dinosn
Nicolas Krassas
3 years
mast1c0re: Part 3 – Escaping the PS5 emulator
Tweet card summary image
reddit.com
Explore this post and more from the netsec community
0
11
27
@offensive_con
offensivecon
3 years
It's time everybody!!! the OffensiveCon23 ticket shop is now open! Get your tickets quickly, as they tend to run out pretty soon.
4
38
84
@grsecurity
grsecurity
3 years
Old news for us, but others might find it interesting: https://t.co/0SxKtXdnrn See: https://t.co/LPpFFv2Doj (2019) https://t.co/ikRCf9erb4 (2018) Users should not take too seriously the cover stories used to disguise embargoed vulnerability fixes.
@grsecurity
grsecurity
8 years
Based solely on what you've read from Linus ( https://t.co/DmUHLq8wsx) and publications like LWN, ( https://t.co/7DfxaqPZEJ https://t.co/hYsEQnEIKJ) do the current KAISER/PTI implementations prevent defeating KASLR via Meltdown on Intel CPUs?
0
4
20
@ProjectZeroBugs
Project Zero Bugs
3 years
Exploiting CVE-2022-42703 - Bringing back the stack attack
2
38
104
@Dinosn
Nicolas Krassas
3 years
KmsdBot Botnet Is Down After Operator Sends Typo In Command
theregister.com
Cashdollar: 'It’s not often we get this kind of story in security'
0
3
7
@Dinosn
Nicolas Krassas
3 years
How the 8086 processor's microcode engine works
0
15
30