zhiniang peng Profile
zhiniang peng

@edwardzpeng

Followers
5,946
Following
90
Media
23
Statuses
83

Cyber Security & Cryptograhpy

Joined August 2015
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@edwardzpeng
zhiniang peng
2 months
Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows
Tweet media one
1
116
368
@edwardzpeng
zhiniang peng
5 years
Pre-auth RCE on multiple Xiaomi Routers found by Gaia and me.
1
86
164
@edwardzpeng
zhiniang peng
1 year
Sharing our slides for #POC2022 , 'Exploiting Errors in Windows Error Reporting in 2022 '
0
31
87
@edwardzpeng
zhiniang peng
4 years
After 2 weeks communication, microsoft now realized that 50 of my bugs are EOP now. But They also found an excuse to merge more than half of them. They are in different server. It's crazy to merge them and try to minimize the bounty. How stupid I am still hunting on Windows Bugs.
8
12
83
@edwardzpeng
zhiniang peng
2 years
Sharing our slides and paper for Usenix Security 2022:
1
27
83
@edwardzpeng
zhiniang peng
2 years
As a vulnerability researcher, you will always experience the "the lyricism of logic", "the joy of statistics" and "the beauty of coincidence". Sometimes you feel like a scientist, engineer, detective or artist.😬
2
3
67
@edwardzpeng
zhiniang peng
3 years
Happy to rank #6 this year. Too busy this year, hope I can have more time to play the game next year. Thanks @msftsecresponse for the great program and Congratulations to all the researchers list on, especially @guhe120
Tweet media one
2
0
59
@edwardzpeng
zhiniang peng
4 years
Yesterday was my last day at Qihoo, It was really a privilege to work with so many excellent researchers in Qihoo for the last 2 years and 10 months. The journey of my security research is temporarily over now :( . I will start a new adventure soon :) .
4
0
57
@edwardzpeng
zhiniang peng
5 years
My slides for #cansecwest 2019<Danger of using fully homomorphic encryption a look at microsoft seal> 来自 @SlideShare
3
15
45
@edwardzpeng
zhiniang peng
2 years
Excited to see our research got 2 @PwnieAwards nominations this year.
@PwnieAwards
Pwnie Awards
2 years
Congrats! And thanks for grabbing snapshots of all the nominees so we can share them here as well 😅
4
5
41
1
2
42
@edwardzpeng
zhiniang peng
6 months
the 6th time for talk in #Zer0con & #POC , See you in Seoul
@POC_Crew
POC_Crew 👨‍👩‍👦‍👦
6 months
[Zer0Con2024⬛️🟨Speaker #2 ] 👨‍👦 @edwardzpeng & R4nger & Q4n - Escaping the Sandbox (Chrome and Adobe PDF reader) on Windows #Zer0Con2024
Tweet media one
0
2
24
2
3
41
@edwardzpeng
zhiniang peng
3 years
The Log4j2 RCE is extremly hot in china. Why twttier is so quiet about it? Act now and deal with it.
4
0
36
@edwardzpeng
zhiniang peng
1 year
See you in Seoul
@POC_Crew
POC_Crew 👨‍👩‍👦‍👦
1 year
[POC2023] - SPEAKER UPDATE2⃣ 💁‍♂️ @wh1tc @edwardzpeng OLE object are still dangerous today - Exploiting Microsoft Office #POC2023
Tweet media one
0
3
42
0
3
38
@edwardzpeng
zhiniang peng
2 years
Feeling happy and lucky that I am still listed in the MSRC top 10 this year🤣
@msftsecresponse
Security Response
2 years
Congratulations to our MSRC 2022 Most Valuable Researchers! Thank you to all the researchers who have helped secure our customers. Check out our blog for the full list: #cybersecurity #securityresearch
Tweet media one
1
30
94
1
0
37
@edwardzpeng
zhiniang peng
1 month
our jumpserver preauth RCE is nominated for Pwnie Award this year
@PwnieAwards
Pwnie Awards
2 months
🚨We are very pleased to announce the nominees for the 2024 Pwnie Awards! Be sure to tag your friends and catch us at Def Con! 🚨 🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇🥳🏇
9
77
210
0
2
33
@edwardzpeng
zhiniang peng
2 years
We will talk about Exchange in #Zer0Con2022
@POC_Crew
POC_Crew 👨‍👩‍👦‍👦
2 years
[Zer0Con2022] line-up We are currently exploiting - Chrome, Windows, MacOS, iOS, Android, Hyper V, Exchange Server And more to come aboard! Check out for more: #Zer0Con2022
2
7
46
0
5
32
@edwardzpeng
zhiniang peng
4 years
Static Detection of File Access Control Vulnerabilities on Windows System
1
7
32
@edwardzpeng
zhiniang peng
4 months
Two different bugs happened in different RPC call, different function, different class, but with similar pattern Merged by MSRC. I am not satisfied with the reason at all.
Tweet media one
2
7
31
@edwardzpeng
zhiniang peng
10 days
See you at #TheSAS2024
@TheSAScon
TheSAS2024
10 days
🧙‍♂️ Join us at #TheSAS2024 to learn more about the automated discovery of Windows RPC/COM vulnerabilities. Dr. Zhiniang Peng's ( @edwardzpeng ) talk will walk us through the intricate workings of RPC/COM fuzzing, and provide a tool to streamline the testing and monitoring of
Tweet media one
0
1
18
1
5
36
@edwardzpeng
zhiniang peng
1 year
I didn't expect that I'm still in top 10 this year😅. Congrats to all reserachers on the list, and thanks to @msftsecresponse
@msftsecresponse
Security Response
1 year
Congratulations to our MSRC 2023 Most Valuable Researchers! Thank you to all the researchers who have helped secure our customers. 👏🎉 Check out our blog for the full list:
Tweet media one
3
24
103
4
1
31
@edwardzpeng
zhiniang peng
6 months
See you in Singapore #offbyone conference
@offbyoneconf
Off-By-One Conference
6 months
A big welcome to Dr. Zhiniang Peng ( @edwardzpeng ), Fangming Gu ( @afang5472 ) and R4NGER to our panel of speakers. 👏 👏 👏 They will be presenting on: XALPC - A System-Wide RPC Fuzzer and Monitor for Automatic Vulnerability. Read their exciting abstract:
Tweet media one
Tweet media two
Tweet media three
2
5
23
0
1
28
@edwardzpeng
zhiniang peng
4 months
2 Preauth RCE we reported on Nvidia Triton Inference Server patched this month, The current security state of AI infrastructure is fragile.
1
0
28
@edwardzpeng
zhiniang peng
11 months
Another JumpServer vulnerability reported by us has been fixed. It can lead to password reset of default admin user (pre-auth). It's not a low severity bug, patch it.
1
5
27
@edwardzpeng
zhiniang peng
17 days
I spent some time this week studying some talk of a recent top conference in cybersecurity (I won’t mention its name), which was a lot of nonsense.🤖
1
0
26
@edwardzpeng
zhiniang peng
1 month
@mkolsek Will share a blogpost in august.
0
0
25
@edwardzpeng
zhiniang peng
4 years
Happy and lucky to rank #2 this year. Congrats to all guys on the list from Qihoo 360 and SCUT. 😁
@msftsecresponse
Security Response
4 years
Congratulations to our 2020 MSRC Most Valuable Security Researchers! We are thrilled to see so many researchers contributing to the security of millions of customers and the broader ecosystem. Check out our blog for the full list: #ResearcherRecognition
0
29
58
1
2
23
@edwardzpeng
zhiniang peng
5 years
The final scoreboards for #WCTF2019 . Thank you all for playing and see you next year!
Tweet media one
Tweet media two
Tweet media three
0
4
21
@edwardzpeng
zhiniang peng
5 years
Publishing my talk in #PacSec2019 with slides and Speech. It's a survey of security problems in zero-knowledge proof cryptocurrency. I also propose ZKP applications for hackers to evade supervision. 来自 @SlideShare
1
7
19
@edwardzpeng
zhiniang peng
4 years
A wonderful journey this year in MSRC bounty program. Great thanks to engineers from @msftsecresponse and @SylvieInBeta @ja_wreck for your help.
@ja_wreck
Jarek
4 years
$13.7 million in bounty rewards since July 2019. Thank you to all the researchers from across the globe who have helped keep our customers secure.
1
3
19
4
0
18
@edwardzpeng
zhiniang peng
6 months
Securing open source is tough. We found a serious vulnerability in #OpenStack 's default setting, but it stayed unresolved for long time due to its related with another open source community😟😟😟
2
0
17
@edwardzpeng
zhiniang peng
5 years
@SlideShare Full speech text can be found here: (It's very time consuming for non-english speaker to prepare such a talk, hope it useful for you).
0
3
14
@edwardzpeng
zhiniang peng
4 months
Had a nice time at #HITBxPHDays in Bangkok
Tweet media one
0
1
15
@edwardzpeng
zhiniang peng
5 years
Publishing our slides for [Financial Cryptography 2020], smilar attack works on other #cryptocurrency (EOS NEO ONT). Really sorry that I can't attend the conference due to #coronavirus
0
3
8
@edwardzpeng
zhiniang peng
1 month
This is a joint work with @Ver0759 @LewisLee53
1
0
5
@edwardzpeng
zhiniang peng
11 months
@tentau4 In our exploit, there is no warning like this one. So, real 1-click
0
0
4
@edwardzpeng
zhiniang peng
9 months
Wow!
@oct0xor
Boris Larin
9 months
We're revealing details of an obscure debugging feature in the Apple A12-A16 SoC’s that bypasses all of the hard-to-hack hardware-based memory protections on new iPhones. Its not used by the firmware and we don't know how the attackers found out about it.
26
268
981
0
0
3
@edwardzpeng
zhiniang peng
4 years
@soaj1664ashar @msftsecresponse I am just lucky to find a good attack surface. Your continuous output is very impressive👍
1
0
3
@edwardzpeng
zhiniang peng
6 months
@edwardzpeng
zhiniang peng
6 months
Securing open source is tough. We found a serious vulnerability in #OpenStack 's default setting, but it stayed unresolved for long time due to its related with another open source community😟😟😟
2
0
17
0
0
3
@edwardzpeng
zhiniang peng
5 years
Verifying myself: I am zhiniang_peng on . pf64vOlukkOhmXOmxdzk36Cxgo6itvffQQ79 /
0
0
2
@edwardzpeng
zhiniang peng
11 months
@steventseeley looks like many people didn’t change it.
1
0
2
@edwardzpeng
zhiniang peng
4 years
@guhe120 想看,但不敢点开
0
0
1
@edwardzpeng
zhiniang peng
5 years
@tiraniddo @epakskape Seems there is no bounty for hardlink bugs for about half a year ago. Beacuse it not works in insider preview. But it still works on the latest windows 10 1909. Is this a strategy for Microsoft to save money?
1
0
1
@edwardzpeng
zhiniang peng
1 year
@hardik05 @linhlhq Hope to meet you at the next event
0
0
1
@edwardzpeng
zhiniang peng
5 years
@stephen0x2dfox @afang5472 Deleted at Microsoft's request
1
0
1
@edwardzpeng
zhiniang peng
4 years
@steventseeley Thank you~Looking forward to reading your new excellent research in the future
0
0
1