|
You are here |
mksben.l0.cm | ||
| | | | |
www.yegor256.com
|
|
| | | | | Not every bug you report will be accepted by a project and paid for; here is a list of tricks to increase your chances. | |
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues. | |
| | | | |
www.sstic.org
|
|
| | | | | [AI summary] A presentation on reverse engineering and security vulnerabilities in Valve's Remote Play protocol used in Steam, highlighting discovered bugs and exploitation potential. | |
| | | | |
tomverbeure.github.io
|
|
| | | Previous installments in this series: In the Lab - Tektronix TDS 420A Oscilloscope, Tektronix TDS 420A Remote Control over GPIB, Extracting the Tektronix TDS 420A Firmware | ||