qwerty (@_qwerty_po) 's Twitter Profile
qwerty

@_qwerty_po

@POSTECH_PLUS 20 Pwner / @theori_io - @dreamhack_io

ID: 1326581638478790661

linkhttps://github.com/qwerty-po calendar_today11-11-2020 17:44:50

260 Tweet

931 Followers

198 Following

qwerty (@_qwerty_po) 's Twitter Profile Photo

The dreamhack CTF invitational quals will be held from 2025/02/08 00:00(UTC+0) to 2025/02/09 00:00(UTC+0)! dreamhack.io/ctf/651 This is an individual competition, and the problems have been prepared with great effort. I encourage many interested participants to join!

qwerty (@_qwerty_po) 's Twitter Profile Photo

I’m delighted that Cold Fusion has advanced to the finals once again following last year! Having felt unhelpful at DEF CON quals for years, I’m relieved to have contributed this time. I'm truly grateful to our members who worked so hard in this quals. See you all in the finals!

I’m delighted that Cold Fusion has advanced to the finals once again following last year! Having felt unhelpful at DEF CON quals for years, I’m relieved to have contributed this time. 
I'm truly grateful to our members who worked so hard in this quals. See you all in the finals!
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Sweet! Hyunwoo Kim (@V4bel) and Wongi Lee (qwerty) of Theori were able to escalate to root on Red Hat Enterprise Linux. They head off to the disclosure room to cover the details of their exploit.

Sweet! Hyunwoo Kim (@V4bel) and Wongi Lee (<a href="/_qwerty_po/">qwerty</a>) of Theori were able to escalate to root on Red Hat Enterprise Linux. They head off to the disclosure room to cover the details of their exploit.
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have another collision. Hyunwoo Kim (@V4bel) and Wongi Lee (qwerty) of Theori were able to escalate to root on Red Hat Linux with an info leak and a UAF, but one of the bugs used was an N-day. They still win $15,000 and 1.5 Master of Pwn points. #Pwn2Own

We have another collision. Hyunwoo Kim (@V4bel) and Wongi Lee (<a href="/_qwerty_po/">qwerty</a>) of Theori were able to escalate to root on Red Hat Linux with an info leak and a UAF, but one of the bugs used was an N-day. They still win $15,000 and 1.5 Master of Pwn points. #Pwn2Own
V4bel (@v4bel) 's Twitter Profile Photo

qwerty and I exploited a VSock 1-day in Google kernelCTF back in *February*, securing $71,337 🥳 (CVE-2025-21756, exp237/exp249) And I’ve just published the write-up: github.com/google/securit… A kernel developer reviewing a patch for a separate VSock bug I submitted