DawnSecurityLab (@dawnseclab) 's Twitter Profile
DawnSecurityLab

@dawnseclab

Dawn Security Lab focusing on system & iOT security dawnslab.jd.com

ID: 1437385631127117825

calendar_today13-09-2021 12:00:33

21 Tweet

810 Followers

6 Following

DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

Our recent research writeup on Parallels Desktop which found real exploit bugs and fixed in newest version: dawnslab.jd.com/pd-exploit-bloโ€ฆ English version: dawnslab.jd.com/pd-exploit-bloโ€ฆ

DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

Our new blog post: To be a bug hunter with Binary Ninja in IoT dawnslab.jd.com/binaryninja1-eโ€ฆ Chinese version: dawnslab.jd.com/binaryninja1-zโ€ฆ

DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

The details of this chain are finally published in our CanSecWest talk and our blog, check it out at dawnslab.jd.com/mystique-paperโ€ฆ . Slide: dawnslab.jd.com/mystique-paperโ€ฆ Whitepaper: dawnslab.jd.com/mystique-paperโ€ฆ

DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

New blog post on our recent discovered vulnerability: Linux kernel io_uring module privilege escalation exploit dawnslab.jd.com/linux-5.19-rc2โ€ฆ

Pwnie Awards (@pwnieawards) 's Twitter Profile Photo

The first nomination for Best Priv Esc: DawnSecurityLab for โ€œMystique in the House: The Droid Vulnerability Chain That Owns All Your Userspaceโ€ Where an overly-permissive SELinux policy in Android to bypass OS level permissions and break out of the sandbox!

GEEKCON (@geekcontop) 's Twitter Profile Photo

GEEKCON 2024 International is just one month away! We're thrilled to unveil the official schedule and topics! Dive deep into over 30 technical programs, join 40+ white-hat hacker teams, and mark your calendars for May 25th & 26th in Singapore! ๐Ÿ‘Huge thanks to our ommitte,

GEEKCON 2024 International is just one month away!  We're thrilled to unveil the official schedule and topics! Dive deep into over 30 technical programs, join 40+ white-hat hacker teams, and mark your calendars for May 25th & 26th in Singapore! ๐Ÿ‘Huge thanks to our ommitte,
Zhongquan Li (@guluisacat) 's Twitter Profile Photo

#BHUSA Black Hat My Black Hat USA 2024 presentation is finished. Thank you all for coming. In my presentation, I disclosed some methods to achieve SBX and LPE. Many of them require launching an app, so in an attack scenario, the user may notice an app icon briefly

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

hzshang ๐’๐ก๐š๐ง๐  ๐‡๐จ๐ง๐ ๐ณ๐ž, will be presenting his paper "๐’๐ข๐ฆ๐ฉ๐ฅ๐ž ๐ข๐ฌ ๐๐ž๐ฌ๐ญ: ๐“๐ก๐ž ๐ฃ๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐จ๐Ÿ ๐ญ๐š๐ค๐ข๐ง๐  ๐จ๐ฏ๐ž๐ซ ๐ฆ๐จ๐›๐ข๐ฅ๐ž ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ ๐ฎ๐ฌ๐ข๐ง๐  ๐š ๐†๐๐” ๐ฅ๐จ๐ ๐ข๐œ๐š๐ฅ ๐›๐ฎ๐  at #OBO2025! offbyone.sg/conference/shaโ€ฆโ€ฆ offbyone.sg/register

<a href="/hzshang15/">hzshang</a> ๐’๐ก๐š๐ง๐  ๐‡๐จ๐ง๐ ๐ณ๐ž, will be presenting his paper "๐’๐ข๐ฆ๐ฉ๐ฅ๐ž ๐ข๐ฌ ๐๐ž๐ฌ๐ญ: ๐“๐ก๐ž ๐ฃ๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐จ๐Ÿ ๐ญ๐š๐ค๐ข๐ง๐  ๐จ๐ฏ๐ž๐ซ ๐ฆ๐จ๐›๐ข๐ฅ๐ž ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ ๐ฎ๐ฌ๐ข๐ง๐  ๐š ๐†๐๐” ๐ฅ๐จ๐ ๐ข๐œ๐š๐ฅ ๐›๐ฎ๐  at #OBO2025! offbyone.sg/conference/shaโ€ฆโ€ฆ offbyone.sg/register
flanker017 (@flanker_hqd) 's Twitter Profile Photo

Years later it's thrilled to back to Vancouver and speak again at CanSecWest. Brought to mind the good old days of playing Pwn2Own.

Years later it's thrilled to back to Vancouver and speak again at CanSecWest. Brought to mind the good old days of playing Pwn2Own.
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Shang Hongze (hzshang) is a senior security researcher at DawnSecurityLab. Hongze presents his research on Android GPU components over the past year, a vulnerability he has found, how he achieved local privilege escalation... and more! More info: linkedin.com/posts/off-by-oโ€ฆ

Shang Hongze (<a href="/hzshang15/">hzshang</a>) is a senior security researcher at <a href="/dawnseclab/">DawnSecurityLab</a>.

Hongze presents his research on Android GPU components over the past year, a vulnerability he has found, how he achieved local privilege escalation... and more!   

More info: linkedin.com/posts/off-by-oโ€ฆ
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Punching ๐ŸฅŠ presentation from hzshang , ๐’๐ข๐ฆ๐ฉ๐ฅ๐ž ๐ข๐ฌ ๐๐ž๐ฌ๐ญ: ๐“๐ก๐ž ๐ฃ๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐จ๐Ÿ ๐ญ๐š๐ค๐ข๐ง๐  ๐จ๐ฏ๐ž๐ซ ๐ฆ๐จ๐›๐ข๐ฅ๐ž ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ ๐ฎ๐ฌ๐ข๐ง๐  ๐š ๐†๐๐” ๐ฅ๐จ๐ ๐ข๐œ๐š๐ฅ ๐›๐ฎ๐ . We ๐Ÿฉท it at Off-By-One Conference 2025!

Punching ๐ŸฅŠ presentation from <a href="/hzshang15/">hzshang</a> , ๐’๐ข๐ฆ๐ฉ๐ฅ๐ž ๐ข๐ฌ ๐๐ž๐ฌ๐ญ: ๐“๐ก๐ž ๐ฃ๐จ๐ฎ๐ซ๐ง๐ž๐ฒ ๐จ๐Ÿ ๐ญ๐š๐ค๐ข๐ง๐  ๐จ๐ฏ๐ž๐ซ ๐ฆ๐จ๐›๐ข๐ฅ๐ž ๐ฌ๐ฒ๐ฌ๐ญ๐ž๐ฆ ๐ฎ๐ฌ๐ข๐ง๐  ๐š ๐†๐๐” ๐ฅ๐จ๐ ๐ข๐œ๐š๐ฅ ๐›๐ฎ๐ .
We ๐Ÿฉท it at <a href="/offbyoneconf/">Off-By-One Conference</a>  2025!
DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

New post: dawnslab.jd.com/%E4%B9%8B%E6%Aโ€ฆ writeup for CVE-2025-22056, which we also found but collide with other researchers. A nice bug that can be stably exploited to get kernel privilege on Ubuntu.

PT Security (@ptsecurity_en) 's Twitter Profile Photo

How do you pwn billions of devices with one shot? cnwatcher reveals a stealthy Android exploit that hijacks keystore keys, bypasses perms, and opens the door to root. Get know more on #PHTalks Jakarta: phtalks.ptsecurity.com/jakarta

How do you pwn billions of devices with one shot? <a href="/cnwatcher/">cnwatcher</a> reveals a stealthy Android exploit that hijacks keystore keys, bypasses perms, and opens the door to root. Get know more on #PHTalks Jakarta: phtalks.ptsecurity.com/jakarta