@lokoumd Profile picture

Lucas Troncy

@lokoumd

Pentester, security researcher

Similar User
Ranjeet Rane photo

@OldWonk

Liroo photo

@LirooPierre

Akavish photo

@akavish33

rosie🌹 photo

@RIKILIFT

🆃🆁🅸🅺🅸 photo

@Trikiwinky

meyroux photo

@meyroux1

Lucas Troncy Reposted

We've had our first collision of #Pwn2Own Ireland. The @Synacktiv team exploited the #Lorex camera with two bugs, but one had previously been used in the contest. They still earn $11,250 and 2.25 Master of Pwn points. #P2OIreland

Tweet Image 1

Lucas Troncy Reposted

New breach: Internet Archive had 31M records breached last month including email address, screen name and bcrypt password hash. 54% were already in @haveibeenpwned Read more: bleepingcomputer.com/news/security/…


Lucas Troncy Reposted

Our very own @_p0ly_ and @masthoon are now presenting: 0-click RCE on Tesla Model 3 through TPMS Sensors #HEXACON2024

Tweet Image 1

Lucas Troncy Reposted

There’s a reason they call it ethical hacking. Good pentesters will document their activity via commands they ran and screenshots, but we don’t track every little thing, that would be impossible given the timeframe we test in. Pentesters are entrusted with organizations deep…


Lucas Troncy Reposted

here me out, this dude is not getting replaced by AI

Tweet Image 1

Lucas Troncy Reposted

> 37,000 commits per year > deploys straight to production > how to not break prod? “just code more carefully” Absolute Chad


Lucas Troncy Reposted

Quelqu'un lui a juste dit que les études d'informatique commençait par une semaine de piscine ?

Est-ce que vous vous rendez bien compte que de toutes les études possibles en parallèle de sa carrière sportive ce crack de Léon Marchand a choisi L'INFORMATIQUE ?!!

Tweet Image 1


Lucas Troncy Reposted

We found a CPU bug that allows an arbitrary physical memory write, thus allow to *read* and *write* the memory for every process! Check out the website for more details: ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

Tweet Image 1


Lucas Troncy Reposted

This is what I mean when I say working with MSRC is degrading. They want everything: write up, stack traces, PoC, exploit source, analysis, life advice, approval on anything you will ever publish. In return they will patch your bug whenever they feel like it and not tell you

Uncoordinated Vulnerability Disclosure: After more than a decade of CVD, has it benefited vendors or researchers more? Have the number of bugs increased to where vendors simply cannot cope with CVD? @dustin_childs has some thoughts - & lots of questions. zerodayinitiative.com/blog/2024/7/15…



Lucas Troncy Reposted

wtf that's me


Lucas Troncy Reposted

I'm on a 6-hour flight with Starlink, and I am using my GPD Pocket tiny laptop, to Parsec home to my desktop and access all my virtual machines and home lab server. Honestly I just think it is funny. 😂

Tweet Image 1

Lucas Troncy Reposted

400 000 lignes de log


Lucas Troncy Reposted

Black hats hate this: hacker-proof your Windows PC

Tweet Image 1

Lucas Troncy Reposted

The final boss of tipping: this landlord sent a rent payment request ($1,549) and the tenant web portal has a tipping option (15%, 20%, 25% or custom).

Tweet Image 1

Lucas Troncy Reposted

CVE-2024-20391 - Our ninjas @l4x4 and @k3vinTell discovered that a mouse and a vulnerable Cisco NAM Client is all you need to get SYSTEM privileges from unauthenticated physical access. synacktiv.com/advisories/cod…


Lucas Troncy Reposted

Broadcom managed to turn VMware software download into an escape room 😂 mikeroysoft.com/post/download-…

Tweet Image 1

Lucas Troncy Reposted

Our second talk is about pwning the Tesla Infotainment in 0-click, by @vdehors and @_p0ly_

Tweet Image 1

Lucas Troncy Reposted

Memo to myself: Take a high quality photoshoot before getting arrested


Lucas Troncy Reposted

Update: Someone asked for a comment from Synology. Synology confirmed they were targeted by (what they believe to be) a spear-phishing campaign in April, 2023. tl;dr the data is old. No ransomware was deployed. The company is not impacted.

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.