Diego Palacios
Cybersecurity Engineer specialized in low-level security.

I earned a Bachelor’s degree in Cybersecurity Engineering from Universidad Rey Juan Carlos, graduating top of my cohort with 23 Honours and an average grade of 9.25/10. I was awarded the Bachelor’s Degree Extraordinary Award.
Currently, I work as a Cybersecurity Researcher at WTW (FINEX Western Europe).
If you’d like to know more about me, feel free to check out my LinkedIn:
My Latest Work
- Oracle VM VirtualBox 7.0.10 r158379 Escape
- In this post, I’ll take you through an in-depth analysis of CVE-2023-22098. We’ll begin by exploring the vulnerability and diving into some Virtio-net internals. Next, I’ll guide you through setting up a debugging environment, and we’ll wrap things up by developing a fully reliable PoC that escapes VirtualBox (it includes an ASLR bypass).
- Quememu Writeup HackOn 2024 CTF
- In this post, I’ll walk you through an in-depth analysis of one of the challenges I created with a colleague for the HackOn 2024 CTF. It’s a QEMU escape challenge built around a custom device we added. To capture the flag, participants must break out of the QEMU virtual machine and read a file located on the host. This writeup focuses on the vulnerability and the full exploitation process.
- N-day exploit: CVE-2023-22098 (VirtualBox 7.0.10 r158379 Escape)
- Proof of concept for CVE-2023-22098 discovered by Andy Nguyen.
- N-day exploit: CVE-2023-4911 (Looney Tunables)
- Proof of concept for CVE-2023-4911 (Looney Tunables) discovered by Qualys Threat Research Unit.
- PWN challenges created for the Hackon CTF 2023 and 2024
- These challenges were developed alongside a colleague. Some of the challenge topics include:
- QEMU Escape
- Slub off-by-one to escape Seccomp
- TOCTOU
- Shellcoding
- These challenges were developed alongside a colleague. Some of the challenge topics include: