seal
@seal9055
Followers
2K
Following
278
Media
5
Statuses
142
Vulnerability Researcher at @InterruptLabs
Massachusetts, US
Joined January 2021
@steven_rossi_ and I taught a course on Binary Exploitation and Vulnerability Analysis at UMass Amherst for the past 2 years. After this semester's offering we decided to open source all course material including lecture vods, slides, and projects. https://t.co/xzadGh9tJy
9
101
276
Been a while since my last blog post. Fun project I worked on recently that I got to write about. Hope you enjoy the writeup!
1
4
20
Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis" I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things ! Might make it a talk...? π https://t.co/iWoP9GeZhX
zerotistic.blog
Control flow flattening (CFF) is an interesting form of code obfuscation. While most obfuscation techniques focus on making individual operations hard to understand, CFF goes for something more...
4
68
234
A few months back we submitted two exploit chains to the first ever Pwn2Own Automotive competition. We just released a blogpost (part 1 of 2) detailing the bugs we abused to remotely exploit the Phoenix CHARX industrial EV charger and win $60,000 π₯π₯ https://t.co/HmRCIzJm0E
blog.ret2.io
The first Pwn2Own Automotive introduced an interesting category of targets: electric vehicle chargers. This post will detail some of our research on the Phoe...
5
56
181
We are pleased to announce our third annual UMassCTF, UMassCTF2024, is coming up soon! From April 19th @ 6pm EST to April 21st @ 6pm EST, we will be hosting the competition at https://t.co/NBcWckVmvo. Join our discord server for more information at https://t.co/qYptGwSGon.
0
6
9
Fuzzing is preferred over formal verification because proving the absence of bugs is usually unattainable, and fuzzing identifies the same bugs with less effort.
blog.trailofbits.com
We recently introduced our new offering, invariant development as a service. A recurring question that we are asked is, βWhy fuzzing instead of formal verification?β And the answer is, βItβs compli...
3
12
126
After 2 years here's a new blog post:Fuzzing TinyBMP in Rust||From dumb to structure-aware guide.If you're new-ish to Rust and want to dive in and see how you can play w dumb and smart fuzzing give it a try! Shouts to @addisoncrump_vr for the massive help!
0
9
35
Okay I made it public, enjoy :P https://t.co/EEvOw4DxLj
for those wondering what this is, I mapped all the Chrome bug bounty submissions to their rewards and commits and turned it into a tree view that can be browsed interactively it's money *others* have made not me haha π
10
65
316
Really cool start, curious to see where this goes!
starting a new fuzzer project on the blog that is based on an old @gamozolabs idea. in the first post, we load a statically built Bochs emulator ELF into our fuzzer process and execute it. there is some code and the humble beginnings of a repo. lets gooo
0
1
10
Massively proud of the @InterruptLabs crew. Even with an extremely unlucky draw order and a certain vendor playing games weβve landed joint 3rd out of 30 teams
That's a wrap on #Pwn2Own Toronto 2023! We awarded $1,038,250 for 58 unique 0-days during the event. Congratulations to Team Viettel (@vcslab) for winning Master of Pwn with $180K and 30 points. We'll see you at Pwn2Own Automotive in Tokyo next January.
2
8
81
My FiiO M6 presentation from BSidesRDU is now up on YouTube :) https://t.co/P1qZclVdQP
0
4
12
PASTA is the culmination of years of work trying to wrangle reliable and actionable data out of Clang. The effort has required a lot of hacking and custom patches to Clang, especially in the preprocessor, but the results speak for themselves.
Clang isn't a toolsmith's compiler. PASTA tries to fix this by providing safe-to-use C++ and Python wrappers to the Clang AST. PASTA also answers questions that Clang can't, like how parsed tokens relate back to macro expansions and files. Learn more:
0
8
28
SeungHyun in our lab found critical vulnerbilities in vm2, which is a well known JavaScript sandbox. Unfortunatetly, these bugs cannot be fixed without changing its whole sandboxing strategy. So now vm2 becomes DEPRECATED π³π³π³
vm2 is now officially deprecated due to several vulnerabilities under disclosure process. https://t.co/NiCHy3o5jT
1
10
109
Happy to announce that I'll be starting as a vulnerability researcher at @InterruptLabs next week!
10
2
84
I have received a $100,000 sponsorship specifically for Ladybird browser development! π€ππ More details to come..
73
75
2K
A new blog post about 3 vulnerabilities I found in the Kanboard Management Software with over 10 million downloads and how a user could've spread malicious tasks across all the projects, enjoy! https://t.co/L21TpBH1D5
1
6
33
Over the past semester, I've been working on creating a software simulator for the R3000 CPU, including mem/cache and a MIPS-1 assembler. If you have 30 minutes, try writing and running your own programs on it! https://t.co/ieoGkXXH4F
github.com
C++-based simulator of the R3000 CPU. Contribute to rsalz47/i-love-you-r3000 development by creating an account on GitHub.
1
1
9
For the past two years me and @seal9055 taught a binary exploitation class at @manningcics , today weβre making the lectures and materials public for everyone at
@steven_rossi_ and I taught a course on Binary Exploitation and Vulnerability Analysis at UMass Amherst for the past 2 years. After this semester's offering we decided to open source all course material including lecture vods, slides, and projects. https://t.co/xzadGh9tJy
3
15
65
Topics Include: - Reverse Engineering - Stack Exploitation (Shellcode, ROP, Mitigation Bypasses) - Heap Exploitation (Glibc Intro, House of Force, Tcache Dup) - Program Analysis (Fuzzing, Intel Pin, LLVM, Symbolic)
1
0
12
Gonna be apartment hunting in Manhattan next week, letβs see how that will go :P
1
0
2
@Laughing_Mantis Iβm open for subcontract work writing custom fuzzers, harnesses, or emulator extensions. Iβll update my site soon, but past work on https://t.co/aIZmtJTBE3 is representative of my skill set and I have a resume on linkedin. Also open for private training, syllabus is on the site.
fuzzing.io
Research Presentations Evolutionary Kernel Fuzzing Recon, Montreal, Canada, July 2017 Black Hat, Las Vegas, USA, July 2017 Harnessing Intel Processor Trace on Windows for Vulnerability Discovery Hack...
0
14
37