spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile
spaceraccoon | Eugene Lim

@spaceraccoonsec

Here to learn! Infosec@Open Government Products | White Hat && SecOps

ID: 1114203730851680256

linkhttps://spaceraccoon.dev calendar_today05-04-2019 16:30:45

1,1K Tweet

23,23K Followers

297 Following

Harley (@infinitelogins) 's Twitter Profile Photo

Two weeks ago I announced I was giving away a copy of spaceraccoon | Eugene Lim's new book called "From Day Zero to Zero Day". A winner has been selected at random! Congratulations to elhamzanadjeh, I will email you your voucher. Thank you No Starch Press for making this possible.

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

I hacked an Optical Network Terminal (ONT)! This one was slightly more hardened than the usual ones, but thankfully hardware hacking expands your toolbox... spaceraccoon.dev/getting-shell-…

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Want to find bugs faster? These 5 tips will save you hours👇 1️⃣ Fuzz before reverse engineering Reverse engineering takes time. Quick fuzzing can immediately expose bugs, helping you prioritize where to dig deeper. Let the crashes guide your RE path. 2️⃣ Use simple fuzzers

Want to find bugs faster?

These 5 tips will save you hours👇

1️⃣ Fuzz before reverse engineering

Reverse engineering takes time. Quick fuzzing can immediately expose bugs, helping you prioritize where to dig deeper. Let the crashes guide your RE path.

2️⃣ Use simple fuzzers
spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Curious how zero-day vulnerabilities are really discovered? Join me at Singapore’s Central Public Library on Aug 29 for a free talk and book signing for From Day Zero to Zero Day -  a deep dive into real-world research, tools, and mindset. Free to attend. Bring your

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

Expanding fuzzing beyond open source binaries is still rare. Most testers limit themselves to what they can compile or debug. In Chapter 9 of my new book From Day Zero to Zero Day, I explore how to apply modern fuzzing to closed-source, memory-managed, and syntactic targets.

Expanding fuzzing beyond open source binaries is still rare.

Most testers limit themselves to what they can compile or debug.

In Chapter 9 of my new book From Day Zero to Zero Day, I explore how to apply modern fuzzing to closed-source, memory-managed, and syntactic targets.