
Midnight Blue
@midnightbluelab
Boutique security consultancy firm specialized in high-end security research
ID: 932770560932802560
http://www.midnightblue.nl 21-11-2017 00:40:06
8 Tweet
414 Followers
398 Following

Some amazing research from Carlo Meijer, researcher at Radboud University and Midnight Blue, into self-encrypting SSD vulnerabilities: ru.nl/english/news-a…

Success! The Midnight Blue (Midnight Blue) / PHP Hooligans team executed their attack against the Sony XAV-AX5500. They’re off to the disclosure room for confirmation. #Pwn2Own

Confirmed! The Midnight Blue (Midnight Blue) / PHP Hooligans team used a 3-bug chain against the Phoenix Contact CHARX SEC-3100. They earn $30,000 and 6 Master of Pwn Points. #Pwn2Own


Success! The Midnight Blue (Midnight Blue) / PHP Hooligans team used a stack-based buffer overflow to exploit the Autel MaxiCharger AC Wallbox Commercial. #Pwn2Own


Verified! PHP Hooligans / Midnight Blue (Midnight Blue) used a single bug to exploit the Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland


Rick (Rick de Jager) at Midnight Blue found a 0-day, dubbed RISK:STATION, providing unauth 0-click RCE as root on Synology NAS. Exploitation does not require direct internet exposure, so millions of devices are at-risk until patched. Check riskstation.net for details next week.

