boredpentester Profile Banner
Josh Profile
Josh

@boredpentester

Followers
692
Following
5K
Statuses
1K

Embedded device security researcher / VR / Pwn2Own / RE

Joined September 2018
Don't wanna be here? Send us removal request.
@boredpentester
Josh
2 years
I've put together a new blog post! This one re-treads @bl4sty's earlier AMLogic research but takes my own approach to exploit development, with an 'alternative' vulnerability and an emulator. Just for fun!
1
24
50
@boredpentester
Josh
4 days
@nyan_satan Any plans to write this up?
1
0
0
@boredpentester
Josh
6 days
RT @udunadan: This 1000% applies to vulnerability research & exploit development. I think it's even the single most defining thing about th…
0
3
0
@boredpentester
Josh
10 days
@BHinfoSecurity Embedded device security research and exploit development:
0
7
31
@boredpentester
Josh
14 days
@SinSinology @stephenfewer Going super sayian at Pwn2Own is ultimate goals Sina πŸ‘πŸ‘
1
0
1
@boredpentester
Josh
17 days
@viperbjk A YouTube or stream would be cool!
0
0
1
@boredpentester
Josh
18 days
@ChatableApps It does! That, and I need to invest in more targets!
0
0
0
@boredpentester
Josh
18 days
Unfortunately, this year all I found was bound checks and non exploitable bugs, but I'm sure I'll find some cool heap overflow issues soon!
1
0
2
@boredpentester
Josh
18 days
Even with typical IDA plugins like VulFi, this process is labourious at scale and simply checking imports doesn't provide enough context. So I've improved my automation to detect known unsafe function use in libraries, their xrefs, and whose calling those xrefs🀠.
1
0
1
@boredpentester
Josh
18 days
The Kenwood IVI for example, it has an almost monolithic structure where the one Infotainment binary employs many custom libraries for things like image resizing, calling into audio codecs, or doing string parsing. There are other components of course, but this is a big one.
1
0
2
@boredpentester
Josh
18 days
@thezdi @SinSinology @SummoningTeam Super sayian status achieved!
0
0
1
@boredpentester
Josh
19 days
πŸ‘πŸ‘πŸ‘
@thezdi
Trend Zero Day Initiative
19 days
Confirmed! @SinSinology of @SummoningTeam combined a couple of bugs to exploit the WOLFBOX charger and introduce it to the world of #Pwn2Own. His efforts earn him $50,000 and 5 Master of Pwn points.
Tweet media one
Tweet media two
0
0
5
@boredpentester
Josh
20 days
πŸ‘πŸ‘πŸ‘
@thezdi
Trend Zero Day Initiative
20 days
Whew! It took two attempts but the @Synacktiv team successfully exploited the #ChargePoint EV Charger and demonstrated signal manipulation over the connector. They are off to the disclosure room to go over how they did it. #P2OAuto #Pwn2Own
0
0
0
@boredpentester
Josh
25 days
Now that Pwn2Own Automotive is almost out of the way, what targets are you looking forward to working on next?
0
0
0
@boredpentester
Josh
27 days
RT @Raspberry_Pi: Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In c…
0
204
0