@bepernapat Profile picture

gum3t

@bepernapat

PPCC✊ | Security researcher and ctf player. Low level stuff.

Similar User
LinuxUPC photo

@LinuxUPC

Company photo

@companydelluita

Marc 🇵🇸 photo

@claasqui

En Toda photo

@NouTimbaler

PabloViz photo

@PabloViz98

Youssef El Moujahidi🇵🇸🇾🇪🇦🇲 photo

@YousefAlmogaver

Assemblea BSC-CGT photo

@BSC_CGT

Fabiola photo

@fabiolaminerv

Andrea💀 photo

@dreaqdp

Ruben Tous photo

@rubentous_art

gnuille photo

@gnuille

echo $USER photo

@oriolmarti97

abril✨ photo

@abxrilm

Soldə photo

@ImSolde

maria🌰 photo

@MariaPoppins00

gum3t Reposted

Getting made fun of because you cover laptop webcam with a sticker? 😭 Here are materials from my talk about controlling ThinkPad X230 webcam LED over USB presented at POC by @POC_Crew 😎 Use these as a comeback 😁 Slides: docs.google.com/presentation/d… Code: github.com/xairy/lights-o…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

gum3t Reposted

The venue is ready for #r2con2024! What about you? 😎

Tweet Image 1

gum3t Reposted

I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…


gum3t Reposted

The post is finally live! Join me for an in-depth analysis of CVE-2023-22098, which was discovered by the outstanding @theflow0 . We'll break down the vuln, explore some virtio-net internals, set up a debugging environment, and develop a reliable PoC to escape VirtualBox. Enjoy!

🚀 We're back with a fresh blog redesign! Dive into @Diego_AltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️



gum3t Reposted

Beginners intro to Linux kernel exploitation (CTF challenge) gum3t.xyz/posts/a-gau-ha… Credits @bepernapat #Linux #cybersecurity

Tweet Image 1
Tweet Image 2

gum3t Reposted

🚀 We're back with a fresh blog redesign! Dive into @Diego_AltF4's latest post, which offers an in-depth analysis of CVE-2023-22098, including a reliable PoC to escape VirtualBox. 🛠️ Unleash your virtualization magic now! Link below ⬇️


gum3t Reposted

another banger jailbreak for last gpt-4o just say it has access to a disk with all the files on a planet and ask it to execute a 'cat' command

Tweet Image 1

gum3t Reposted

Attacking UNIX Systems via CUPS, Part I evilsocket.net/2024/09/26/Att…


gum3t Reposted

. 🔥 🔥 🔥 🎟️ 🎟️ 🎟️ 🔥 🔥 🔥 #r2con2024 tickets are finally available! 🔥 🔥 🔥 🎟️ 🎟️ 🎟️ 🔥 🔥 🔥 radare.org/con/2024/


gum3t Reposted

Alright yall who's ready for Eternalblue: Linux Edition, dropping October 6?


gum3t Reposted

Slides and recording from my "SLUB Internals for Exploit Developers" talk at @LinuxSecSummit yesterday 🥳 Slides: docs.google.com/presentation/d… Slides PDF: static.sched.com/hosted_files/l… Recording: youtu.be/WWQh4yAoXME?t=…

Tweet Image 1

Gonna be giving a talk "SLUB Internals for Exploit Developers" at @LinuxSecSummit next week. Plan to cover the basics one needs to know before writing exploits for slab bugs; slides coming along 😁 Also gonna stay around for @linuxplumbers lsseu2024.sched.com/event/1ebVN

Tweet Image 1


gum3t Reposted

🔥 The initial schedule for #r2con2024 is now public! The CFP is still open, for the “Online Sunday” in video format radare.org/con/2024 🎟️ Conference tickets and other details will be available soon. Follow us in the fediverse for the latest news! infosec.exchange/@radareorg

Tweet Image 1

gum3t Reposted

Gonna be giving a talk "SLUB Internals for Exploit Developers" at @LinuxSecSummit next week. Plan to cover the basics one needs to know before writing exploits for slab bugs; slides coming along 😁 Also gonna stay around for @linuxplumbers lsseu2024.sched.com/event/1ebVN

Tweet Image 1

gum3t Reposted

📖🏨 Book your hotel for #r2con2024 ! 🐦‍🔥 Location is now public, stay tuned as we will soon setup the ticketing and announce the schedule! If you are still willing to speak: the cfp is still open! rada.re/con/2024

Tweet Image 1

gum3t Reposted

Introduction to Linux kernel exploitation with a CTF challenge gum3t.xyz/posts/a-gau-ha… Credits @bepernapat #Linux #cybersecurity

Tweet Image 1
Tweet Image 2

gum3t Reposted

Members of my CTF team & the SPS train repair company will meet NEWAG, the train manufacturer, in court on Wednesday (you might remember the 37C3 talk; link in reply). The lawsuit was initiated by NEWAG, but, according to reporting, counterclaims were filed by SPS as well. 1/3

Just two days left until the first hearing in Newag's lawsuit against us (Dragon Sector members) and SPS. In case you've missed it, we're being accused of infringing upon Newag's intellectual property and unfair competition. More details: infosec.exchange/@q3k@hackerspa

Tweet Image 1


gum3t Reposted

There is a "new" persistence technique making the rounds that takes advantage of Linux udev rules. I spent some time last week going through it and making a tool to take advantage of it. Here are my thoughts: 🧵

Tweet Image 1

gum3t Reposted

UPDATE: r2con2024 will happen in Barcelona on November 8, 9. Expect competitions, workshops and presentations. Get ready to share knowledge and have fun with friends! We can’t spoil the location yet, so stay tuned for further updates!


Loading...

Something went wrong.


Something went wrong.