Skip to content

O mnie

Podstawowe informacje

Imię/Nazwisko: Mateusz ‘j00ru’ Jurczyk
Team: Vexillium
CTF Team: Dragon Sector (wicekapitan)
Praca: Google (wcześniej: Hispasec Sistemas)
LinkedIn: Profil
Twitter: @j00ru

Kontakt

E-Mail: j00ru.vx@gmail.com

Książki

Konferencje

DateLanguageEventTitle
2016PolishSecurity PWNing ConferenceGraficzny format Windows Metafile: analiza wektorów ataku i najnowszych podatności
2016EnglishBlack Hat EuropeEffective File Format Fuzzing – Thoughts, Techniques and Results
2016EnglishPacSecWindows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities
2016EnglishRuxconWindows Metafiles: An Analysis of the EMF Attack Surface & Recent Vulnerabilities
2016EnglishWarConEffective file format fuzzing - thoughts, techniques and results
2015PolishSekurak Hacking PartyFakty, mity i przemyślenia na temat offensive security
2015English44CONReverse engineering and exploiting font rasterizers: the OpenType saga
2015EnglishREconOne font vulnerability to rule them all: A story of cross-software ownage, shared codebases and advanced exploitation
2015PolishSekcja Bezpieczeństwa Informacji PTIOffensive software security - fakty, mity i przemyślenia
2015EnglishInsomni'hackPwning (sometimes) with style – Dragons’ notes on CTFs
2014PolishSECUREUcieczka z Matrixa: (nie)bezpieczna analiza malware
2014EnglishCONFidenceOn the battlefield with the Dragons – the interesting and surprising CTF challenges
2013EnglishZeroNightsWindows Kernel Trap Handler and NTVDM Vulnerabilities – Case Study
2013EnglishBlack Hat USABochspwn: Identifying 0-days via system-wide memory access pattern analysis
2013EnglishCONFidenceBeyond MOV ADD XOR – the unusual and unexpected in x86
2013PolishSEConferenceBezpieczeństwo jądra Windows, lub jak zabić system dwiema instrukcjami
2013EnglishNoSuchConAbusing the Windows Kernel: How to Crash an Operating System With Two Instructions
2013EnglishSyScanBochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns
2012EnglishZeroNightsWindows Kernel Reference Count Vulnerabilities - Case Study
2010PolishSecDayArchitektura procesora a exploitacja w systemie Windows
2010EnglishCONFidenceCase study of recent Windows vulnerabilities
2010PolishSEConferencePraktyczne spojrzenie na luki bezpieczeństwa jądra Windows
2009PolishSecDayBootkity vs Windows

Artykuły / Publikacje

DateLanguageMagazineTitleCo-authors
2016PolishProgramistaFuzzingGynvael Coldwind
2014PolishProgramistaZdobyć flagę... DEF CON CTF 2014 - wdub (v2)
2014PolishProgramistaJak napisać własny debugger w systemie Windows – część 4
2014PolishPWNProgramistyczne PotknięciaGynvael Coldwind
2014PolishProgramistaJak napisać własny debugger w systemie Windows – część 3
2014PolishProgramistaJak napisać własny debugger w systemie Windows – część 2
2014PolishProgramistaJak napisać własny debugger w systemie Windows – część 1
2014English, RussianXAKEPWindows Kernel Trap Handler and NTVDM Vulnerabilities - Case Study
2013PolishProgramistaBliżej silikonu #2Gynvael Coldwind
2013PolishProgramistaBliżej silikonu #1Gynvael Coldwind
2013EnglishIdentifying and Exploiting Windows Kernel Race Conditions via Memory Access PatternsGynvael Coldwind
2013PolishProgramistaAddressSanitizer: szybki detektor błędów pamięci
2012EnglishHack In The Box MagazineMemory Copy Functions in Local Windows Kernel Exploitation
2012EnglishHack In The Box MagazineThe story of CVE-2011-2018 exploitation
2011EnglishHack In The Box MagazineWindows Security Hardening Through Kernel Address Protection
2011EnglishHack In The Box MagazineWindows Handle Numeric Allocation in Depth
2011EnglishHack In The Box MagazineWindows CSRSS Tips & Tricks
2011EnglishExploiting the otherwise non-exploitable: Windows Kernel-mode GS cookies subvertedGynvael Coldwind
2010EnglishHack In The Box MagazineCustom console hosts on Windows 7
2010EnglishHack In The Box MagazineReserve Objects in Windows 7
2010PolishHakin9Błędy typu Write-What-Where w jądrze Windowsa
2010English"Case study of recent Windows Vulnerabilities" slidesGynvael Coldwind
2010EnglishHack In The Box MagazineWindows Objects in Kernel Vulnerability Exploitation
2010PolishHakin9Luki bezpieczeństwa jądra Windows
2010EnglishGDT and LDT in Windows kernel vulnerability exploitationGynvael Coldwind

PGP Key

Jeśli zamierzasz dzielić się prywatnymi informacjami, poniżej znajdziesz mój klucz pgp (alternatywnie do pobrania tutaj):

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2.0.22 (MingW32)
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=0kDH
-----END PGP PUBLIC KEY BLOCK-----