Tri
@trichimtrich
Followers
1K
Following
685
Media
5
Statuses
360
Cybersec @Seasecresponse @qriousec @vnsec
Joined March 2014
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. https://t.co/vYvVPtF2PP by @lanleft_ + @__suto
qriousec.github.io
Introduction Back in the beginning of the year 2024, we started our project on ANGLE, it is a chromium graphic library, handling rendering stuff on chrome process. Fortunately, our team found some of...
2
34
156
Theses findings found by our AI Agent. Probably some writeup when more complex issue got destricted. https://t.co/ho0lrb9OEL
github.com
Contribute to qriousec/web3_finding development by creating an account on GitHub.
0
8
32
A brief JavascriptCore RCE story by @lanleft_ and An Nguyễn https://t.co/mKJMcmVZGS
qriousec.github.io
Introduction The vulnerability introduced in commit 053d9a84 is a trivial uninitialized memory issue, easy to catch by simple unit tests. At the time of discovering the bug, we believed that this...
0
56
226
We reported a total of 51 bugs (low to critical impact) for IoT devices used by Singapore Smart City and Smart Building. https://t.co/WLDvEzg3CE
1
3
24
hey #googlectf folks please give us a v8 sbx challenge so we can make our recent submitted 0day useful one last time
1
4
52
Well done on some awesome research @n30m1nd @sherl0ck__ !! Keep tackling those hard targets! https://t.co/Ka89BplXla
#chrome #Exploit #vulnerabilityresearch
blog.exodusintel.com
By Javier Jimenez and Vignesh Rao Overview In this blog post we take a look at a vulnerability that we found in Google Chrome’s V8 JavaScript engine a few months ago. This vulnerability was patched...
1
94
213
#OffensiveCon23 recordings are now live! Hope you enjoy :) https://t.co/8cvBFzxoVU
youtube.com
OffensiveCon 2023 Talks
4
269
613
Our idapcode plugin was released today! That's a very useful tool to lift IDA assembly code to Ghidra P-Code. /cc @HexRaysSA @ilfak
https://t.co/Fb2GfgggTf
0
36
99
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate and speed up some tedious Windows Kernel Drivers reverse engineering tasks.
voidsec.com
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks.
0
36
114
Here are the final Master of Pwn standings. Congrats to @Synacktiv on claiming the title. It was a close race, but they pull through.
2
36
124
Confirmed! trichmitrich used nearly all the time on the clock, but his command injection bug is unique. His takeover of the Cisco RV340 via the WAN interface earns him $30,000 and 3 Master of Pwn points. #Pwn2Own #P2OAustin
0
7
37
Confirmed! @bienpnn's last attempt of day 1 was successful. He used a single OOB Read bug to take over the TP-Link AC1750 via the LAN interface. This unique bug chain earns him another $5,000 and 1 Master of Pwn point. #Pwn2Own #P2OAustin
0
7
17
Confirmed! @bienpnn from Team Orca of Sea Security used a three-bug chain, including an auth bypass and a command injection, to take over the LAN interface of the Cisco RV340. He earns $15,000 and 2 Master of Pwn points. His contest total so far is #45,000. #Pwn2Own #P2OAustin
0
3
17
Success! In the 2nd demonstration of the contest, @bienpnn from Team Orca of Sea Security ( https://t.co/flIrHUt3bG) was able to get a root shell on the WAN interface of the Cisco RV340 router. He's off to the disclosure call to verify the details. #Pwn2Own Austin #P2OAustin
0
6
26
Another confirmation! trichimtrich used an OOB Read to get a root shell via the LAN interface of the #TP-Link AC1750 Smart Wi-Fi router. That earns him $5,000 and 1 Master of Pwn point. #Pwn2Own #P2OAustin
0
4
14
I wrote an ppt about kernel vulnerability and exploitation; https://t.co/AZ3SAqiP7D Chinese version
1
37
99
New blog on the background and methodology of some research I did into escaping Windows Server containers, why the bugs were eventually fixed, and why you still shouldn't use them :-)
3
172
321