Personal Information
Entreprise/Lieu de travail
A Coruña Area, Spain Spain
Profession
CEO, Vulnerability researcher
Secteur d’activité
Technology / Software / Internet
À propos
Experience in reverse engineering focused on find software vulnerabilities, with expert knowledge in SO internals, kernel device drivers and subsystems: mainly in Windows platforms and in to a lesser extent in OS X / iOS.
I wrote multiple exploits in up-to-date protected systems: exploited stack-based overflows, heap-based overflows, pool overflows, use-after-free, integer overflow leading to buffer overflow / memory leaks...
So I got knowledge about compiler, SO and CPU protection features: Enhanced GS, SEHOP, SAFESEH, Heap hardening, ASLR, DEP/NX, VTGuard, SMEP, SMAP, CFG...
Some of the exploiting techniques and mitigation bypasses learned are: RET/SEH address overwrite, Object's V-...
J’aime
(21)Rainbow Over the Windows: More Colors Than You Could Expect
Peter Hlavaty
•
il y a 7 ans
SyScan360 - Stefan Esser - OS X El Capitan sinking the S\H/IP
Stefan Esser
•
il y a 8 ans
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
•
il y a 8 ans
Exploitation and State Machines
Michael Scovetta
•
il y a 12 ans
[Blackhat2015] FileCry attack against Internet Explorer
Moabi.com
•
il y a 8 ans
[Blackhat2015] SMB : SHARING MORE THAN JUST YOUR FILES... #Whitepaper
Moabi.com
•
il y a 8 ans
Advanced cfg bypass on adobe flash player 18 defcon russia 23
DefconRussia
•
il y a 8 ans
Memory Corruption: from sandbox to SMM
Positive Hack Days
•
il y a 8 ans
Virtunoid: Breaking out of KVM
Nelson Elhage
•
il y a 12 ans
Keygenning using the Z3 SMT Solver
extremecoders
•
il y a 9 ans
SyScan 2015 - iOS 678 Security - A Study in Fail
Stefan Esser
•
il y a 9 ans
Rooted con 2015 - Rojos y Azules: dos equipos con dos sabores
Alejandro Ramos
•
il y a 9 ans
Infección en BIOS, UEFI y derivados
David Barroso
•
il y a 9 ans
[HackInTheBox] Breaking virtualization by any means
Moabi.com
•
il y a 13 ans
Vulnerability desing patterns
Peter Hlavaty
•
il y a 9 ans
Final lfh presentation (3)
__x86
•
il y a 11 ans
HES2011 - Tarjei Mandt – Kernel Pool Exploitation on Windows 7
Hackito Ergo Sum
•
il y a 13 ans
Reduce stress in_15_simple_ways
Roslyn Yee
•
il y a 9 ans
Attack on the Core
Peter Hlavaty
•
il y a 9 ans
Targeting the iOS kernel
Seguridad Apple
•
il y a 12 ans
Ruxcon 2014 - Stefan Esser - iOS8 Containers, Sandboxes and Entitlements
Stefan Esser
•
il y a 9 ans
Personal Information
Entreprise/Lieu de travail
A Coruña Area, Spain Spain
Profession
CEO, Vulnerability researcher
Secteur d’activité
Technology / Software / Internet
À propos
Experience in reverse engineering focused on find software vulnerabilities, with expert knowledge in SO internals, kernel device drivers and subsystems: mainly in Windows platforms and in to a lesser extent in OS X / iOS.
I wrote multiple exploits in up-to-date protected systems: exploited stack-based overflows, heap-based overflows, pool overflows, use-after-free, integer overflow leading to buffer overflow / memory leaks...
So I got knowledge about compiler, SO and CPU protection features: Enhanced GS, SEHOP, SAFESEH, Heap hardening, ASLR, DEP/NX, VTGuard, SMEP, SMAP, CFG...
Some of the exploiting techniques and mitigation bypasses learned are: RET/SEH address overwrite, Object's V-...