Alex Plaskett 

999 Followers
164 Following
94 Posts
Security Researcher | Pwn2Own Mobile/Desktop 2018, Austin 2021, Toronto 2022 | Toots mainly about 0day, OS, mobile and embedded security.
Bloghttps://alexplaskett.github.io/
Twitterhttps://twitter.com/alexjplaskett

You should write an article for Phrack #71 !! I hear it's coming out by summer time. đź‘€

Let's open the windows and get some phresh air back into the scene.

If you've got a story to tell, you should send it in by April 1st and keep the vibe going. :)

http://phrack.org

.:: Phrack Magazine ::.

Phrack staff website.

Is this thing still on?

Jumping on the bandwagon. Now also at:

https://www.threads.net/@alex_plaskett

Alex Plaskett (@alex_plaskett) on Threads

4 Followers. Security Researcher | Pwn2Own 2018, 2021, 2022 | Talks about 0day, OS, mobile and embedded security | Twitter: alexjplaskett

Threads
Have you heard about the Open Security Training platform @OpenSecurityTraining2 ? My company NCC Group has been sponsoring that I develop a Windows kernel exploitation training that is currently being beta tested. After that, it will be open sourced to everyone!
 At Offensivecon 2023 NCC Group EDG @alexplaskett and myself will present about Exploit Engineering - Attacking the Linux Kernel https://www.offensivecon.org/speakers/2023/alex-plaskett-and-cedric-halbronn.html 
Alex Plaskett and Cedric Halbronn | OffensiveCon

Ghostscript RCE CVE-2023-28879 can impact many applications processing images and PDF files.
Discovery and exploitation write-up by team member @sigabrt : https://offsec.almond.consulting/ghostscript-cve-2023-28879.html
Shell in the Ghost: Ghostscript CVE-2023-28879 writeup - Almond Offensive Security Blog

#44CON 2023 Call for Papers open : https://cfp.44con.com - single track again - make it good! first selection around end May/beginning June ish.
CFP Unit

It’s been years in the making and we’re finally ready to show the world: don’t miss Yeoul’s EuroLLVM keynote, “-fbounds-safety: enforcing bounds safety for production C code”! https://discourse.llvm.org/t/the-2023-eurollvm-program/69514
The 2023 EuroLLVM Program

The LLVM Foundation is pleased to announce the 2023 EuroLLVM Program! As a reminder, Early Bird Registration ends on April 10th. Keynote Speaker Order out of Chaos, The LLVM Release Process. Tobias Hieta “-fbounds-safety”: Enforcing bounds safety for production C code Yeoul Na Technical Talk Speaker An example of data flow analysis in MLIR Tom Eccles MLIR-based offline memory planning and other graph-level optimizations for xcore.ai Deepak Panickal A Rusty CHERI: Th...

LLVM Discussion Forums

Cool presentation from last year by @saidelike, @alexplaskett, @fidgetingbits, @cvisines at NCC Group

#Pwn2Own 2021 Remotely #Exploiting 3 #Embedded Devices (Netgear R6700 Router, Western Digital PR4100 NAS, Lexmark Printer MC3224i)

https://research.nccgroup.com/wp-content/uploads/2022/07/pwn2own-3-bugs-technical-external.pdf

I’m excited to share what I’ve been hacking on for the past few years: The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.

This is the story behind CVE-2022-3266, CVE-2022-32939, CVE-2022-42846, and CVE-2022-42850 along with an extended RCA of CVE-2022-22675.
đź§µ

The full schedule for #Pwn2Own Vancouver 2023 is now available! We have 19 entries targeting 9 targets, including 2 #Tesla attempts and a SharePoint RCE. Read the details at https://www.zerodayinitiative.com/blog/2023/3/21/pwn2own-vancouver-schedule-2023
Zero Day Initiative — Pwn2Own Vancouver 2023 - The Full Schedule

Welcome to Pwn2Own Vancouver for 2023! This year’s event promises some exciting research as we have 19 entries targeting nine different targets - including two Tesla attempts. For this year’s event, every round will pay full price, which means if all exploits succeed, we’ll award over $1,000,000

Zero Day Initiative