cbayet (@onlytheduck) 's Twitter Profile
cbayet

@onlytheduck

Security expert and CTO @Reverse_Tactics

ID: 851714360171012096

calendar_today11-04-2017 08:31:42

387 Tweet

1,1K Followers

360 Following

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Ready for GreHack ! This Friday, catch cbayet's talk "Attacking Hypervisors: A practical case". If you're attending, Last year's talk is a must-read for background on hypervisor security. Check it out here : reversetactics.com/publications/2…

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

Slides & video from our GreHack talk "Attacking Hypervisors - A Practical Case" are online! Learn how we exploited vulnerabilities to escape VirtualBox during Pwn2Own Vancouver 2024: reversetactics.com/publications/2…

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (SinSinology) of Summoning Team (SummoningTeam) is our Master of Pwn. #P2OAuto

And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we  awarded $886,250 for 49 0-days over the three day competition. With 30.5  points and $222,250 awarded, Sina Kheirkhah (<a href="/SinSinology/">SinSinology</a>) of Summoning Team (<a href="/SummoningTeam/">SummoningTeam</a>) is our Master of Pwn. #P2OAuto
cbayet (@onlytheduck) 's Twitter Profile Photo

If you see hypervisors as magic black boxes that are hard to break, join us to this training and learn to apply your reverse, bug hunting and exploit knowledge to build VM escapes !

SinSinology (@sinsinology) 's Twitter Profile Photo

it took me so much time to finish this exploit but I finally did it! my first guest-to-host virtualbox escape is finally ready, using a combination of 2 bugs I can target the latest version :) Eternal thank you to my dear friend Corentin cbayet for constantly encouraging me

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

🌪️ Speaker Announcement! Excited to welcome cbayet to the #TyphoonCon2025 Conference lineup! Join us in Seoul on May 29-30: typhooncon.com/agenda

🌪️ Speaker Announcement!

Excited to welcome <a href="/OnlyTheDuck/">cbayet</a> to the #TyphoonCon2025 Conference lineup!
Join us in Seoul on May 29-30: typhooncon.com/agenda
REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

It's time for offensivecon and #Pwn2Own ! Come meet us there and and attend our sessions: 📅 Fri, May 16 @ 18:45 — Our talk “Journey to Freedom” about escaping VirtualBox during Pwn2Own 2024 📅 Sat, May 17 @ 14:00 — Watch our live VMware ESXi escape attempt ar #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Sweet! Corentin BAYET (cbayet) from REverse_Tactics barely needed a second to demonstrate his exploit against VMware ESXi. He heads off to the disclosure room to provide the details of his work. #Pwn2Own #P2OBerlin

Sweet! Corentin BAYET (<a href="/OnlyTheDuck/">cbayet</a>) from <a href="/Reverse_Tactics/">REverse_Tactics</a> barely needed a second to demonstrate his exploit against VMware ESXi. He heads off to the disclosure room to provide the details of his work. #Pwn2Own #P2OBerlin
cbayet (@onlytheduck) 's Twitter Profile Photo

Love the top-bottom approach of this blogpost ! A great way to explain internals in my opinion, and the kind of reference you look when you're trying to exploit a heap bug. Also glad to see that our paper (with paulfariello ✏️) of 2020 is still relevant !