@h3xr4bb1t Profile picture

HexRabbit

@h3xr4bb1t

CTF pwnable / gamer / anime

Similar User
HITCON photo

@HacksInTaiwan

NiNi photo

@terrynini38514

5unkn0wn photo

@5unKn0wn

Angelboy photo

@scwuaptx

bincat photo

@_bincat

Faith 🇧🇩🇦🇺 photo

@farazsth98

splitline 🐈‍⬛ photo

@_splitline_

stypr photo

@brokenpacifist

Lays photo

@_L4ys

P4nda photo

@P4nda20371774

yuawn photo

@_yuawn

Cyber Advising photo

@cyber_advising

sqrtrev photo

@sqrtrev

ddaa photo

@0xddaa

sakura photo

@eternalsakura13

HexRabbit Reposted

r00tkitsmm.github.io/fuzzing/2024/1… TL;DR I Implemented a super reliable macOS kernel binary rewriting to instrument any KEXT or XNU at BB or edge level.


First blood🩸

Tips for Pwn2Own player: pick a target that no one care, then you got no collision. Shout out to my colleague: @h3xr4bb1t We manage to bypass all the hardware protection together 🎉



HexRabbit Reposted

🔒 Exploiting memory corruption bugs in server-side software is no easy feat, especially when you're working blind without source code or binaries. See how we used a technique dubbed "Conditional Corruption" to achieve this. bughunters.google.com/blog/622075742…


My talk at @defcon32 on exploiting nftables to earn the kernelCTF bounty will be in 30 minutes on the Warstories track! Feeling a bit nervous before going on stage, hoping it goes well!


HexRabbit Reposted

My talk at @defcon on hacking into Apple's ACE3 chip will be in 45 minutes on track 3! And it just got better: At @BlackHatEvents I learned that Apple will not fix an issue I found, so I will show off a cool way to hack the ACE2 - ever bitbanged SWD through the macOS kernel?😎


I meet @ghidraninja and @LiveOverflow at their awesome @hextreeio hardware glitching lab! #defcon32

Tweet Image 1
Tweet Image 2
Tweet Image 3

HexRabbit Reposted

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code…


HexRabbit Reposted

We found a CPU bug that allows an arbitrary physical memory write, thus allow to *read* and *write* the memory for every process! Check out the website for more details: ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

Tweet Image 1


I think I'm finally prepared for my first talk at DEFCON! #DEFCON32

Tweet Image 1

HexRabbit Reposted

Holy Mother Dragon, what a blogpost about CoreSight. ARMored CoreSight: Towards Efficient Binary-only Fuzzing ricercasecurity.blogspot.com/2021/11/armore…


HexRabbit Reposted

There's a hidden spec in physical CDs that most won't notice. - Many audio players won't rip it. - It gets skipped over when selecting a specific track - It only gets read when playing continuously from beginning to end What is it? Audio pregap data! Many live CDs creatively…

Tweet Image 1

HexRabbit Reposted

#CVE_2024_6387 Finally, if sshd cannot be updated or recompiled, this signal handler race condition can be fixed by simply setting LoginGraceTime to 0 in the configuration file. This makes sshd vulnerable to a denial of service (the exhaustion of all MaxStartups connections),…

Tweet Image 1

#CVE_2024_6387 With this change in strategy, it takes ~10,000 tries on average to win the race condition; i.e., with 100 connections (MaxStartups) accepted per 120 seconds (LoginGraceTime), it takes ~3-4 hours on average to win the race condition, and ~6-8 hours to obtain a…

Tweet Image 1


HexRabbit Reposted

Neuralink started a compression challenge. They're asking for people to find methods to losslessly (!!) compress files to 1/200th (!) the size but the files are extremely noisy so thats certainly not possible 🙁 (spectrogram of one randomly chosen file for illustration)

Tweet Image 1
Tweet Image 2

HexRabbit Reposted

Do you want to exploit #Pixel8 with MTE-enabled? Mobile security researchers @Peterpan980927 & @st424204 presentation “GPUAF - Using a general GPU exploit tech to attack Pixel8” will include a practical demonstration of their advanced exploit technique! offbyone.sg/speakers/

Tweet Image 1
Tweet Image 2

HexRabbit Reposted

Slides of my @offensive_con talk are available: synacktiv.com/sites/default/…


HexRabbit Reposted

Part 4 of our N-Day Exploit Series is LIVE! 🔥 ➡️ blog.theori.io/chaining-n-day… Unveiling CVE-2023-34044, an information leakage vulnerability in #VMware Workstation’s #VBluetooth device, found by our own @pr0ln! It’s a variant of CVE-2023-20870 demonstrated by @starlabs_sg in…


Yay! Just found out that Linux finally assigned CVE-2024-26925 to my first kernelCTF submission! lore.kernel.org/linux-cve-anno…


Loading...

Something went wrong.


Something went wrong.