Midnight Blue (@midnightbluelab) 's Twitter Profile
Midnight Blue

@midnightbluelab

Boutique security consultancy firm specialized in high-end security research

ID: 932770560932802560

linkhttp://www.midnightblue.nl calendar_today21-11-2017 00:40:06

8 Tweet

414 Followers

398 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! The Midnight Blue (Midnight Blue) / PHP Hooligans team executed their attack against the Sony XAV-AX5500. They’re off to the disclosure room for confirmation. #Pwn2Own

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! The Midnight Blue (Midnight Blue) / PHP Hooligans team used a 3-bug chain against the Phoenix Contact CHARX SEC-3100. They earn $30,000 and 6 Master of Pwn Points. #Pwn2Own

Confirmed! The Midnight Blue (<a href="/midnightbluelab/">Midnight Blue</a>) / PHP Hooligans team used a 3-bug chain against the Phoenix Contact CHARX SEC-3100. They earn $30,000 and 6 Master of Pwn Points. #Pwn2Own
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Success! The Midnight Blue (Midnight Blue) / PHP Hooligans team used a stack-based buffer overflow to exploit the Autel MaxiCharger AC Wallbox Commercial. #Pwn2Own

Success! The Midnight Blue (<a href="/midnightbluelab/">Midnight Blue</a>) / PHP Hooligans team used a stack-based buffer overflow to exploit the Autel MaxiCharger AC Wallbox Commercial. #Pwn2Own
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Verified! PHP Hooligans / Midnight Blue (Midnight Blue) used a single bug to exploit the Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland

Verified! PHP Hooligans / Midnight Blue (<a href="/midnightbluelab/">Midnight Blue</a>) used a single bug to exploit the  Canon imageCLASS MF656Cdw printer. They earn themselves $20,000 and 2 Master of Pwn points. #Pwn2Own #P2OIreland
Midnight Blue (@midnightbluelab) 's Twitter Profile Photo

Rick (Rick de Jager) at Midnight Blue found a 0-day, dubbed RISK:STATION, providing unauth 0-click RCE as root on Synology NAS. Exploitation does not require direct internet exposure, so millions of devices are at-risk until patched. Check riskstation.net for details next week.

Midnight Blue (@midnightbluelab) 's Twitter Profile Photo

A brief analysis of the #TRITON / #TRISIS / #HATMAN malware and its multi-stage payload for #TRICONEX safety controllers: midnightbluelabs.com/blog/2018/1/16…