Jack Halon

3.4K posts

Jack Halon banner
Jack Halon

Jack Halon

@jack_halon

Red Team and Offensive R&D at @CrowdStrike | Powered by ☕🍻🍩

Katılım Ekim 2016
403 Takip Edilen4.9K Takipçiler
Sabitlenmiş Tweet
Jack Halon
Jack Halon@jack_halon·
To wrap up 2022, I'm releasing the final part of my 3-part browser exploitation series on Chrome! In this post, we demonstrate the practical use of the concepts we've learned throughout the series by analyzing and exploiting CVE-2018-17463. Enjoy! jhalon.github.io/chrome-browser…
English
8
130
455
55.5K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
What's new is old, and what's old is new - as is relentlessly proven. Join us in our analysis of CVE-2026-32746, the recent pre-auth RCE in inteutils' Telnetd Speak soon. labs.watchtowr.com/a-32-year-old-…
English
1
38
111
10.3K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
In 2025, we achieved pre-auth RCE against another solution in a ransomware gang favourite category. Today, we finally click publish. Join us as we walk through a chain of vulnerabilities we identified in BMC’s FootPrints ITSM solution. Enjoy! labs.watchtowr.com/thanks-itsms-t…
English
1
41
111
16.5K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
We promised we'd be back! Join us on our journey, from repro'ing N-days to stumbling into 0-days in SolarWinds Web Help Desk, eventually achieving pre-auth RCE. This research fuels the watchTowr Platform, our Preemptive Exposure Management technology. labs.watchtowr.com/buy-a-help-des…
English
0
67
206
39K
Jack Halon retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
We just published our @rapid7 analysis of CVE-2026-1731, a critical command injection affecting BeyondTrust Privileged Remote Access (PRA) & Remote Support (RS). Unauthenticated RCE, with a root cause due to Bash arithmetic evaluation. Analysis/PoC here: attackerkb.com/topics/jNMBccs…
English
3
34
122
25.7K
Jack Halon retweetledi
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I wrote a post on creating "scalable research tooling for agent systems" and I'm also releasing the companion MCP server which lets you do autonomous Frida instrumentation on Android. Details in thread 👇📲🪝
English
5
16
117
16.5K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
Someone knows Bash disgustingly well, and we love it. Here's our analysis of the Ivanti EPMM Pre-Auth RCE vulnerabilities - CVE-2026-1281 & CVE-2026-1340. This research fuels our technology, enabling our clients to accurately determine their exposure. labs.watchtowr.com/someone-knows-…
English
8
69
225
32K
Jack Halon retweetledi
Michael Weber
Michael Weber@BouncyHat·
Early last year @rad9800 shared an idea he'd discussed with @jonasLyk about how to stealthily write to the registry without using the traditional registry APIs EDR watches. The time has come to open source the tool. Hope this helps someone hit their goal! praetorian.com/blog/corruptin…
English
5
30
90
4.1K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
Earlier this month, we reported a zero-day auth. bypass in the SmarterTools SmarterMail email solution. Someone has reversed the patch (released on 15th Jan) and begun exploiting it in the wild. Read our analysis and please, ASSUME BREACH + PATCH NOW. labs.watchtowr.com/attackers-with…
English
0
41
95
15.4K
Jack Halon retweetledi
Sean Heelan
Sean Heelan@seanhn·
Blog post: On the Coming Industrialisation of Exploit Generation with LLMs sean.heelan.io/2026/01/18/on-… TL;DR: I ran an experiment with GPT-5.2 and Opus 4.5 based agents to generate exploits for a zeroday QuickJS bug. They're pretty good at it. Code: github.com/SeanHeelan/ana…
English
29
236
1.1K
226.3K
Jack Halon retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices. projectzero.google/2026/01/pixel-…
English
7
240
1K
114.8K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
And, we're back - analyzing CVE-2025-52691, a pre-auth RCE in SmarterTools SmarterMail mail server solution. Speak soon (:^)) and enjoy.. labs.watchtowr.com/do-smart-peopl…
English
5
54
192
37.4K
Jack Halon
Jack Halon@jack_halon·
@HackingLZ The only offsec people who write off TTPs as dead are the ones that don't actually know what they're doing or how EDR works 🤷🏻‍♂️
English
0
0
3
299
Justin Elze
Justin Elze@HackingLZ·
Offsec has this fun love affair with writing techniques off as dead because they popped up in some intel report, and don’t want to spend time necromancing things when often times the EDR signatures are highly specific.
English
9
1
56
7.8K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances. labs.watchtowr.com/soapwn-pwning-…
English
3
110
373
87.1K
Jack Halon retweetledi
watchTowr
watchTowr@watchtowrcyber·
Over the last 12 months, watchTowr Labs uncovered thousands of leaked credentials: cloud keys, AD creds, API tokens, even KYC data - already being abused. Join us on our journey into “innocent” developer tools. labs.watchtowr.com/stop-putting-y…
English
1
53
139
26.3K
Jack Halon retweetledi
Samuel Groß
Samuel Groß@5aelo·
I've uploaded the slides of my recent talk "JS Engine Security in 2025": saelo.github.io/presentations/…. I think there'll also be a recording available at some point (otherwise I can make one as not everything's in the slides). Thanks for the fantastic conference @POC_Crew!
English
3
61
223
19.7K