Hi!
Security researcher interested in Reverse engineering / Vulnerability research / Video games
Currently hunting for in the wild 0-days at Kaspersky GReAT
All views and research in this blog are my own and do not represent my employer
Previously presented at: Virus Bulletin, CanSecWest, SAS, BlueHat, TyphoonCon, ISC, AVAR, Code Blue, CCC, OffensiveCon, …
Securelist articles:
- 2023 - Nokoyawa ransomware attacks with Windows zero-day
- 2021 - MysterySnail attacks with Windows zero-day
- 2021 - PuzzleMaker attacks with Chrome zero-day exploit chain
- 2021 - Zero-day vulnerability in Desktop Window Manager (CVE-2021-28310)
- 2020 - Operation PowerFall: CVE-2020-0986 and variants
- 2020 - Internet Explorer and Windows zero-day exploits used in Operation PowerFall
- 2020 - GReAT thoughts: Awesome IDA Pro plugins
- 2020 - Magnitude exploit kit - evolution
- 2020 - The zero-day exploits of Operation WizardOpium
- 2019 - New zero-day vulnerability CVE-2019-0859 in win32k.sys
- 2019 - Operation ShadowHammer: a high-profile supply chain attack
- 2019 - The fourth horseman: CVE-2019-0797 vulnerability
- 2018 - Zero-day in Windows Kernel Transaction Manager (CVE-2018-8611)
- 2018 - A new exploit for zero-day vulnerability CVE-2018-8589
- 2018 - Zero-day exploit (CVE-2018-8453) used in targeted attacks
- 2018 - Delving deep into VBScript
- 2018 - The King is dead. Long live the King!
- 2018 - Disappearing bytes: Reverse engineering the MS Office RTF parser
- 2018 - A vulnerable driver: lesson almost learned
- 2017 - Analyzing an exploit for CVE-2017-11826
Slides:
- 2020 - Retrospective on the latest zero-days found in the wild
- 2019 - Hacking Sony PlayStation Blu-ray Drives
- 2019 - The evolution and future of supply chain attacks
- 2019 - Operation ShadowHammer
- 2019 - Overview of the latest Windows OS kernel exploits found in the wild
- 2019 - Hacking microcontroller firmware through a USB
- 2018 - Catching multilayered zero-day attacks on MS Office
- 2018 - Exploiting ActionScript3 interpreter