Stephen Sims

4.3K posts

Stephen Sims banner
Stephen Sims

Stephen Sims

@Steph3nSims

Perpetual Student | SANS Fellow | Musician | Braggart Hater | Gray Hat Hacking | VR | 🏂 | deadcode | https://t.co/CadJehomsU

Berkeley, CA Katılım Şubat 2014
860 Takip Edilen25.9K Takipçiler
Stephen Sims
Stephen Sims@Steph3nSims·
This is pretty impressive. Apple Memory Integrity Enforcement (MIE) bypass. Well done! An interesting combination using AI deterministic bug hunting with novel human expertise to bypass MIE. blog.calif.io/p/first-public…
English
3
7
36
2.9K
chompie
chompie@chompie1337·
not a bad return on a 1 month Claude code max sub 😏
@

Confirmed! @chompie1337 of IBM X-Force Offensive Research (XOR) used a single bug to exploit NV Container Toolkit, earning $50,000 and 5 Master of Pwn points. #Pwn2Own #P2OBerlin

English
44
84
1.1K
73.5K
Stephen Sims
Stephen Sims@Steph3nSims·
Please join us on the next @offby1security stream this Friday at 11AM PT with @htejeda for a session on "The Challenges of Building an AI-driven Security Testing Platform and How We Solved Them." We will be announcing more streams shortly! youtube.com/watch?v=3s1fXV…
YouTube video
YouTube
Stephen Sims tweet media
English
1
9
31
1.8K
Stephen Sims
Stephen Sims@Steph3nSims·
I'm very much looking forward to teaching my SANS course SEC660: Advanced Penetration Testing & Exploit Writing in DC this July and in Las Vegas this September! Lot's of cool AI content to share. Hope to see some of you there sans.org/cyber-security… sans.org/cyber-security…
English
0
3
31
1.7K
Stephen Sims retweetledi
Off By One Security
Off By One Security@offby1security·
Happy to share that we sponsored a K9 Officer's Bullet Proof Protective vest for Axel who works for the Mississippi Department of Corrections!
Off By One Security tweet media
English
1
1
11
992
Stephen Sims retweetledi
@·
This should change the opinion of the last person who doubted AI
International Cyber Digest@IntCyberDigest

‼️🚨 Pwn2Own Berlin 2026 just hit a wall. For the first time in 19-years, ZDI rejected dozens of working zero-day RCE submissions because organizers ran out of contest slots. Rejected hackers are now going public with PoC demos and direct vendor disclosures, breaking Pwn2Own's usual secrecy. ▪️ AI surfaces a massive wave of 0-day RCEs. ▪️ Submissions overwhelm ZDI past max capacity. ▪️ Slots run out. Researchers with working chains get rejected. ▪️ "Revenge disclosures" begin. ← we are here. Confirmed casualties so far: ▪️ @xchglabs : 86 vulnerabilities prepared (PyTorch, NVIDIA, Linux KVM, Oracle, Docker, Ollama, Chroma, LiteLLM, llama.cpp). All rejected. Now reporting directly to vendors with writeups dropping as patches land. ▪️ @ggwhyp : full-chain Firefox RCE on Windows. Rejected. Publicly demoed (HTML page → cmd.exe → calc.exe). Responsibly disclosed to Mozilla. ▪️ @yunsu_dev : working RCE chain, rejected. Submitting elsewhere. ▪️ @ryotkak : tried to register for 3+ weeks. ZDI confirmed "at maximum capacity, can't add extra contest days." Considered canceling flight and hotel. ▪️ @anzuukino2802 : Claude Code RCE PoC. Rejected. ▪️ @desckimh : 0-day RCEs in Ollama and LM Studio. Rejected. Reported impact: a community-estimated 150+ researchers tried to register. Accepted contestants are now being warned about collisions. Rejected vulnerabilities going to bug bounty programs may trigger pre-event patches that invalidate the work of those who got in. ZDI has not publicly addressed the capacity issue. The event still runs May 14-16 in Berlin.

English
11
43
495
81.3K
Stephen Sims
Stephen Sims@Steph3nSims·
Question for those in the know… With “for example” Claude Mythos being 5x more expensive than Opus 4.5/6/X regarding tokens: e.g. Mythos $25 p/m input $125 p/m output vs. Opus 4.5/6/X $5 p/m input $25 p/m output And the fact that these are massively VC-funded companies who are subsidizing tokens and providing $1M free spend to select companies… How long before the tokenomics adjustment to make them profitable reaches or exceeds the cost of humans and products in the roles or services potentially disrupted? Or will that threshold not be met? It’s an honest question as I have no idea what the answer is and how much consumption will continue to climb in cost, though it will certainly continue to climb. It has to… I’m of course not picking at any one company as I think Anthropic and OpenAI are doing amazing work, but rather just curious as to where things are going as more powerful models are released. Why? Because I keep getting asked this question by directors at many companies and my answer has been “yes.” Haha I’d love to hear thoughts from those of you who have perspective, or even an opinion.
English
6
6
28
3.1K
Stephen Sims
Stephen Sims@Steph3nSims·
Five years from now the state of the AI-era cybersecurity industry will have resulted in:
English
5
1
10
3.1K
Stephen Sims
Stephen Sims@Steph3nSims·
Warning: Long Tweet! I've been thinking a lot about the forthcoming knowledge gap in hacking and vulnerability research, though it applies far beyond just that. One part that makes me a bit sad is that those coming into the field in the future will never know what it was like during the early days of going to DEF CON, sitting at tables or in hotel rooms with like-minded individuals to work through solving problems both together and individually, and being forced to use your brains and your knowledge... Never giving up! I'm sure that for many of us that the amount of time spent on manually reversing, debugging, coding, etc... could be quantified in literal years of our time spent on this planet. But it was always worth it... Or at least always a learning opportunity! At the same time it's incredibly exciting to be alive having that same knowledge in the AI-era! I don't know that I've been this "energized" about the industry in a long time. I needed to write a Python app today to work with Ollama, a model, and Streamlit that would have taken me days on my own. Instead, I created it far faster than I could have on my own, and after only a couple iterations I had something solid and working well using AI. My point however, is that I've been struggling with trying to answer a couple of questions: 1) How will those coming into the field gain the necessary knowledge in coding, reversing, debugging, etc... to be effective, to identify hallucinations, to understand the who, what, where, when, and why, and to identify new classes of vulnerabilities if AI is performing all of the work and everything is handed up on a silver platter? 2) How important is it for those coming into the field to need to understand those things? ...and if still important now, for how long? I have more questions of course but those are two of the big ones... A lot of the things that I'm able to automate now are of course due to AI first and foremost, but there's the big secondary piece. It's the fact that I've been doing vulnerability research for a very long time and I know a lot of the who, what, where, when, and why... I've decided that on the @offby1security channel I'm going to start a new set of pre-recorded videos, separate from the weekly streams, where I simply cover foundational things that you cannot easily learn without having the practical experience. I need to put more thought into it but will figure it out through experimentation. Even if it only helps a small number of up and comers it's worth it to me. I'm a firm believer that even with all of the AI and automation options that paying your dues in understanding how things work "under the hood" remains crucial. If ever there was a time to not be complacent... it's now! I think that with this gap, and the decline in junior positions and apprenticeships, that Universities are going to need to figure out new ways to help prepare students for this new era. Sorry if I'm coming across all "philosophical" but this has been nagging me for some time now. If you agree or disagree I'd love to hear your thoughts on the matter as I'm still trying to land on an answer.
English
14
22
201
13.1K
Stephen Sims
Stephen Sims@Steph3nSims·
Watch this video with Elias (@allthingsida)!! It will save you a TON of time when reversing software. Amazing cutting-edge techniques!
@

Thanks @Steph3nSims for hosting. I enjoyed showing the capabilities of libghidra and ghidrasql to create AI based reverse engineering workflows. While the “sql” wording can be confusing, ghidrasql can equally do everything, if not more than your favorite MCP you already use.

English
0
4
31
3.6K
Stephen Sims
Stephen Sims@Steph3nSims·
I say this with no ego. I made this comment based on many conversations with development teams of both OSS and commercial software struggling to prioritize patching. Being someone who has sold many PoC's, the proof is in the pudding. I never liked that saying. haha
English
0
1
14
1.5K
Stephen Sims
Stephen Sims@Steph3nSims·
With the low barrier to entry for vulnerability research due to AI, that used to require advanced and niche skills, I'm seeing that exploit mitigation bypasses are still difficult for AI. Weaponizing vulnerabilities still requires advanced knowledge. Disclosure != Skill...
English
8
14
141
14.5K
Stephen Sims
Stephen Sims@Steph3nSims·
I’m almost done assembling the author team for the 7th edition of Gray Hat Hacking through McGraw-Hill. I can’t wait to share with the amazing team of authors with you!
English
1
1
42
2K