5unkn0wn (@5unkn0wn) 's Twitter Profile
5unkn0wn

@5unkn0wn

Taeyang Lee, a security researcher at @theori_io.

ID: 835884442711375872

linkhttps://0wn.kr calendar_today26-02-2017 16:09:15

440 Tweet

1,1K Followers

371 Following

Theori (@theori_io) 's Twitter Profile Photo

2023년 국내외를 뜨겁게 달군🔥 보안 사건 사고를 총정리했습니다! 🛑 #ChatGPT, #Fortinet, #MSAzure 의 보안 취약점 🛑 #랜섬웨어, 해킹 집단의 공격 소식 🚧 각 사건마다 해결한 대처 방법 등 티오리 미디엄 블로그에서 확인해 보세요! link.medium.com/EmWjd3fYcBb #티오리 #보안사고 #인사이트

Tavis Ormandy (@taviso) 's Twitter Profile Photo

First big result from our new CPU research project, a use-after-free in AMD Zen2 processors! 🔥 AMD have just released updated microcode for affected systems, please update! lock.cmpxchg8b.com/zenbleed.html

Farenain (@farenain) 's Twitter Profile Photo

Hello everyone, today I have uploaded the second post on using The Triton library for analyzing a challenge from hacklu from 2 years ago: farena.in/symbolic%20exe…

Crusaders of Rust (@cor_ctf) 's Twitter Profile Photo

Check out FizzBuzz101's corCTF 2023 writeups! Exploiting the Intel sysret hardware bug + a µarch side-channel for KASLR bypass on modern Linux kernel: willsroot.io/2023/08/sysrup… Pwning ring -2 from ring 0 : willsroot.io/2023/08/smm-di… Cracking an AVX-512 VM : willsroot.io/2023/08/vmquac…

ChainLight (@chainlight_io) 's Twitter Profile Photo

We've just published an in-depth post-mortem of the Vyper / Curve Finance attack. Join us as we unravel the critical insights, tactics involved, and lessons learned from this unique cybersecurity incident. blog.chainlight.io/curve-finance-…

Theori (@theori_io) 's Twitter Profile Photo

Theori overtakes the DEF CON leaderboard once again! 🏆 Maple Mallard Magistrates takes 1st place at the world's largest hacking competition, DEFCON CTF. Shout out to our joint partners Maple Bacon and PlaidCTF ! Conquering the most difficult cybersecurity challenges, one at a time 😎

Theori overtakes the <a href="/defcon/">DEF CON</a> leaderboard once again!

🏆 <a href="/mmm_ctf_team/">Maple Mallard Magistrates</a> takes 1st place at the world's largest hacking competition, DEFCON CTF.

Shout out to our joint partners <a href="/maplebaconctf/">Maple Bacon</a> and <a href="/PlaidCTF/">PlaidCTF</a> !

Conquering the most difficult cybersecurity challenges, one at a time 😎
Evilcry_ (@blackmond_) 's Twitter Profile Photo

Poor man's guide to de-obfuscating VMProtect's : Discovery: youtube.com/watch?v=ZhQUbj…… (1/3) Resolution: youtube.com/watch?v=uxOVbG…… (2/3) Import Recontruction: youtube.com/watch?v=GvWSa6…… (3/3)

Theori (@theori_io) 's Twitter Profile Photo

🎉 #Web3 이용자, 거래소, 프로젝트 빌더를 보호하는 통합 보안 플랫폼 ChainLight DART(Digital Asset Risk Tracker)를 런칭했습니다! DART를 통해 웹3상에 산재하는 다양한 취약점과 위협으로부터 보호받으세요. 아래 링크를 눌러 DART에 접속할 수 있습니다 👇 dart.chainlight.io/dashboard?utm_…

🎉 #Web3 이용자, 거래소, 프로젝트 빌더를 보호하는 통합 보안 플랫폼
ChainLight DART(Digital Asset Risk Tracker)를 런칭했습니다!

DART를 통해 웹3상에 산재하는 다양한 취약점과 위협으로부터 보호받으세요.

아래 링크를 눌러 DART에 접속할 수 있습니다 👇
dart.chainlight.io/dashboard?utm_…
ChainLight (@chainlight_io) 's Twitter Profile Photo

Hello, Mr. President. After winning the DEF CON CTF for two consecutive years, the Paradigm CTF, and the Dragonfly >|< CTF, ChainLight had the honor of being invited to the Blue House and conversing with South Korea's President Yoon Suk Yeol. 1/4

Hello, Mr. President.

After winning the <a href="/defcon/">DEF CON</a> CTF for two consecutive years, the <a href="/paradigm/">Paradigm</a> CTF, and the <a href="/dragonfly_xyz/">Dragonfly >|<</a> CTF, ChainLight had the honor of being invited to the Blue House and conversing with South Korea's President Yoon Suk Yeol.

1/4
Tavis Ormandy (@taviso) 's Twitter Profile Photo

New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html

Black Hat MEA (@blackhatmea) 's Twitter Profile Photo

ألف مبروك لفريق The Duck الفائز بالمركز الثاني في مسابقة #التقط_العلم ضمن فعالية #بلاك_هات23، وجائزة 200,000 ريال 👏🏻👏🏻 NEOM Hats off to the incredible champions "The Duck"! 🎩👏 Securing the 2nd place🥈 in CTF competition at #BHMEA23

ألف مبروك لفريق The Duck الفائز بالمركز الثاني في مسابقة #التقط_العلم ضمن فعالية #بلاك_هات23، وجائزة 200,000 ريال 👏🏻👏🏻

<a href="/NEOM/">NEOM</a>

Hats off to the incredible champions "The Duck"! 🎩👏
Securing the 2nd place🥈
in CTF competition at #BHMEA23
BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

🚨Breaking news from the lab: Finding the Hidden Threats Posed by Dead and Vulnerable Code Primitives Our REsearch team highlights the widespread risk of legacy unsafe code fragments distributed across the firmware supply chain and explains how these could lead to high-impact

Theori (@theori_io) 's Twitter Profile Photo

Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE :

5unkn0wn (@5unkn0wn) 's Twitter Profile Photo

Fav chall: Helium implements ephemeral key exchange through slightly modified libhydrogen. The most painful but fun part was analyzing whole inlined sse3 functions and identifying modified algorithms. After exchanging the key, we can read the flag via arbitrary file read vuln😋

5unkn0wn (@5unkn0wn) 's Twitter Profile Photo

Recently, Back Engineering Labs released the crackme obfuscated by the CodeDefender and I reversed the binary: gist.github.com/5unKn0wn/24fa0…. The crackme implemented modified SipHash24, and the goal is to find the input that matches the hash. The obfuscation was nice and quite a challenge !