Infosec.Pub
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
udunadanM to Exploit DevelopmentEnglish · 3 years ago

The Old, The New and The Bypass - One-click/Open-redirect to own Samsung S22 at Pwn2Own 2022

starlabs.sg

external-link
message-square
0
link
fedilink
5
external-link

The Old, The New and The Bypass - One-click/Open-redirect to own Samsung S22 at Pwn2Own 2022

starlabs.sg

udunadanM to Exploit DevelopmentEnglish · 3 years ago
message-square
0
link
fedilink
TLDR; We began our work on Samsung immediately after the release of the Pwn2Own Toronto 2022 target list. In this article, we will dive into the details of an open-redirect vulnerability discovered during the Pwn2Own 2022 event and how we exploited it on a Samsung S22 device. By breaking down the technical aspects and using code snippets, we aim to provide a comprehensive overview of this critical security flaw. To begin, I revisited our team’s paper (written by Li Jiantao and Nguyễn Hoàng Thạch) from previous year, where two bugs were identified.
alert-triangle
You must log in or # to comment.

Exploit Development

exploitdev

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !exploitdev@infosec.pub

A curated community dedicated to strictly technical materials about vulnerability research, exploit development and reverse engineering.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 1 user / 6 months
  • 198 local subscribers
  • 481 subscribers
  • 83 Posts
  • 18 Comments
  • Modlog
  • mods:
  • udunadan
  • BE: 0.19.13
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org