zi0Black  πŸ‰

310 Followers
40 Following
22 Posts
Unimi Student | Security @Aptos Labs | Former Security Researcher @Shielder | CTF @JBZTeam |
I love to turn IoT devices into expensive paperweights✌🏿
Blogzi0Black.github.io

The second edition of TumpiCon is here!
πŸ“… June 27-28, 2025
πŸ“ Somewhere near Turin, Italy
πŸ”’ Invite-only

No flashy stages. No fluff. Just raw, technical, and unfiltered hacking.
More details? If you know, you know.
Follow the trail: https://tumpicon.org

TumpiCon 2025

ICYMI #TumpiCon schedule is out!
Check it out at tumpicon.org πŸ‘€
P.S. expect an email in the next few days with more details πŸžοΈπŸ§‘β€πŸ’»
πŸ‘‹πŸΏ hackers, make sure to check your inbox - we started sending the invites for #TumpiCon2023!
If you did not receive one and you like to join us: DMs are open (pro tip: proposing a talk is an awesome way to raise your chances of receiving an invite πŸ˜‰).
The Six Dumbest Ideas in Computer Security

The actual achievements of this year:
- collected multiple super cool mugs
- got tonnes of swag
- got family recipe inside the Intel PSIRT cooking book
- seated on an exploit for months until someone else reported it
🎁-time: Here you go two Cisco BroadWorks CommPilot Application Software vulnerabilities which our team ( @smaury @zi0Black @thezero ) found during an engagement for one of our customers.
CVE-2022-20951: Unauthenticated #SSRF - https://www.shielder.com/advisories/cisco-broadworks-commpilot-ssrf/
CVE-2022-20958: Authenticated #RCE - https://www.shielder.com/advisories/cisco-broadworks-commpilot-authenticated-remote-code-execution/
Shielder - Cisco BroadWorks CommPilot Application Software Unauthenticated Server-Side Request Forgery (CVE-2022-20951)

CVE-2022-20951: Cisco BroadWorks CommPilot Application exposes a servlet that allows the application to be used as an HTTP proxy server. The lack of validation of the the target URL and the lack of authentication protection allows an unauthenticated attacker to achieve a full-read SSRF.

Shielder

RT @[email protected]

Did you know you can hide your payloads in phone numbers? ☎️😱
RFC3966 specifies parameters for valid phone numbers that can contain characters. @[email protected] discovered that popular libraries are vulnerable and that it can lead to XSS and even ATO!πŸ”₯
#BugBountyTips #NahamCon2022EU

πŸ¦πŸ”—: https://twitter.com/intigriti/status/1604054094808760321

INTIGRITI on Twitter

β€œDid you know you can hide your payloads in phone numbers? ☎️😱 RFC3966 specifies parameters for valid phone numbers that can contain characters. @securinti discovered that popular libraries are vulnerable and that it can lead to XSS and even ATO!πŸ”₯ #BugBountyTips #NahamCon2022EU”

Twitter

RT @[email protected]

And the recording of our @[email protected] USA talk for "Γ†PIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture" is finally out as well!

Check it out πŸ‘€ https://youtu.be/8ZWc7Hcsl8o

cc @[email protected] https://twitter.com/borrello_pietro/status/1557065793954672640

πŸ¦πŸ”—: https://twitter.com/borrello_pietro/status/1595027725441441792

AEPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture

YouTube
This seems like an appropriate first comic for mastodon.

RT @[email protected]

The video of our @[email protected] talk "CustomProcessingUnit: Tracing and Patching Intel Atom Microcode" is finally out!

Check it out at https://youtu.be/C-ZSvTVvK1o

cc @[email protected]

πŸ¦πŸ”—: https://twitter.com/borrello_pietro/status/1593304870236332033

Custom Processing Unit: Tracing and Patching Intel Atom Microcode

YouTube