Areizen (@areizen_) 's Twitter Profile
Areizen

@areizen_

Android Lover.
CTF with @Aperikube

🥷 @Synacktiv

ID: 791993799341903872

linkhttps://www.areizen.fr calendar_today28-10-2016 13:23:31

615 Tweet

784 Followers

470 Following

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Last sponsor we want to introduce is a special one: it's Synacktiv, the company organizing #HEXACON2023. Leader in offensive security, Synacktiv helps companies assess their networks's security. There will be a lot of ninjas in the conference, feel free to talk to them! 🤗

Last sponsor we want to introduce is a special one: it's <a href="/Synacktiv/">Synacktiv</a>, the company organizing #HEXACON2023.
 
Leader in offensive security, Synacktiv helps companies assess their networks's security.

There will be a lot of ninjas in the conference, feel free to talk to them! 🤗
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! Synacktiv was able to execute a 3-bug chain against the Synology BC500. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own

Success! Synacktiv was able to execute a 3-bug chain against the Synology BC500. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own

Success! Synacktiv was able to execute a heap-based buffer overflow in the kernel triggered via WiFi and leading to RCE against the Wyze Cam v3. They earn $15,000 and 3 Master of Pwn points. #Pwn2Own
blasty (@bl4sty) 's Twitter Profile Photo

To celebrate Wyze's decision to release a firmware update a day before this years Pwn2Own Toronto competition.. I've decided to release the exploit for my (killed) bugchain: github.com/blasty/unwyze .. maybe next time they will not withhold patches for critical bugs? 🙃

Synacktiv (@synacktiv) 's Twitter Profile Photo

To facilitate reverse-engineering of large programs, vulnerability research and root-cause analysis on iOS, Android, and other major platforms, myr and Hexa released Frinet, a tool combining Frida with an enhanced version of Tenet. synacktiv.com/publications/f…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Have you ever wondered what the attack surface of Counter Strike: Global Offensive looks like? Our ninjas myr and vic studied it and found a server to client bug! Read more details about this research in our latest blogpost. synacktiv.com/publications/e…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Interested in finding and exploiting vulnerabilities in old video games? If so, you'll love our latest blogpost on American Conquest by Tomtombinary! synacktiv.com/publications/e…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Sometimes, the obstination of our Linux fans leads to interesting findings on iOS USB networking. Have a look at our latest blogpost by @flogallium synacktiv.com/publications/i…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas will be at #OffensiveCon by the end of the week. Don't miss our 3 talks: 🧭Escaping the Safari Sandbox by Quentin M 🚘0-Click RCE on the Tesla Infotainment by vdehors and David B 🗝️Open Sesame by Lucas Georges See you there 👋

Synacktiv (@synacktiv) 's Twitter Profile Photo

Last week, Microsoft released a patch for CVE-2024-26238, a Windows 10 LPE reported by Guillaume André. You can read the advisory here: synacktiv.com/advisories/win…

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-24-837|CVE-2024-6246] (Pwn2Own) Wyze Cam v3 Realtek Wi-Fi Driver Heap-Based Buffer Overflow Remote Code Execution Vulnerability (CVSS 9.6; Credit: vdehors, Mitsurugi Heishiro, Areizen from Synacktiv) zerodayinitiative.com/advisories/ZDI…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another bug collision. The @synacktiv team successfully exploited the #Synology Beestation, but they used a bug previously seen during the contest. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland

We have another bug collision. The @synacktiv team successfully exploited the #Synology Beestation, but they used a bug previously seen during the contest. They still earn $10,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland