johncool

228 posts

johncool

johncool

@JohnCool__

offsec and VR somewhere

Katılım Eylül 2015
175 Takip Edilen1.2K Takipçiler
johncool
johncool@JohnCool__·
We are hiring offensive security researchers @Apple! We are looking for experienced profiles in a variety of fields. Learn more here: jobs.apple.com/en-us/details/… You are into Kernel or Userland Vulnerability Research? My team would love to hear from you! DM me if you have questions
English
27
125
882
75K
johncool retweetledi
cbayet
cbayet@OnlyTheDuck·
New year, new adventure for me @Reverse_Tactics ! A lot of work to come, but hopefully lots of vulnerabilities and exploits ! Feel free to DM me to discuss or leak your bugs 🥸
GIF
REverse_Tactics@Reverse_Tactics

Welcome to @OnlyTheDuck who is joining REverse Tactics for handling exciting security challenges and discovering new vulnerabilities!

English
2
1
18
3.9K
johncool retweetledi
REverse_Tactics
REverse_Tactics@Reverse_Tactics·
Welcome to @OnlyTheDuck who is joining REverse Tactics for handling exciting security challenges and discovering new vulnerabilities!
English
1
3
12
5.9K
johncool
johncool@JohnCool__·
@h0wdeee Hi, one of the original author here. This is indeed CVE-2022-43634. I confirm that this was a critical RCE in Netatalk. Exploiting it is non trivial but can be done reliably. Feel free to DM or ask here if you have any question
English
1
0
1
152
@h0wdy@haunted.computer
@[email protected]@h0wdeee·
hello researcher friends! I have been tasked with looking into CVE-2022-43634, a critical RCE vuln in Netatalk with a CVSS of 9.8 I haven't found any mention of it in the disclosures, but perhaps this will be of as much use to you as it is to me! web.archive.org/web/2023060401…
English
1
2
8
1.4K
johncool retweetledi
Hexacon
Hexacon@hexacon_fr·
Thank you everyone for this amazing second edition! We hope you all had a blast and all the team is already eager to see you all next year for #HEXACON2024 🚀
Hexacon tweet media
English
5
14
111
39.7K
johncool
johncool@JohnCool__·
@lcheylus @OnlyTheDuck @swapgs Et oui… Je pensais pas que ça partirait si vite. Mais c’est tant mieux que la conf génère autant d’engouement.
Français
1
0
0
63
johncool
johncool@JohnCool__·
Because I would love to see the magnificent @OnlyTheDuck on stage (and @swapgs (and the other one too))
Root-Me@rootme_org

The second batch for @GrehackConf 2023 was launched today, and guess what: tickets sold out in minutes 🫣. But lucky you, we had reserved 2 tickets for you! 🤩 👉 Retweet and comment by telling us what motivates you to go to the conference. Random draw Monday lunchtime, we'll announce the winners right away. Good luck to you all !

English
1
2
8
1.6K
johncool retweetledi
Root-Me
Root-Me@rootme_org·
The second batch for @GrehackConf 2023 was launched today, and guess what: tickets sold out in minutes 🫣. But lucky you, we had reserved 2 tickets for you! 🤩 👉 Retweet and comment by telling us what motivates you to go to the conference. Random draw Monday lunchtime, we'll announce the winners right away. Good luck to you all !
Root-Me tweet media
English
15
16
21
12.5K
johncool
johncool@JohnCool__·
@pwning_me At the time we did not know about the previous form of that bug, and we could not argue that it was in fact a different vulnerability. That's why it ended up being a duplicate with your team during #pwn2own
English
0
0
1
105
johncool
johncool@JohnCool__·
@pwning_me If i remember correctly, Netgear shipped a very outdated version of Netatalk that had a similar vulnerability which disappeared during a refactoring and was no longer upstream. In its new form there is indeed a special trick :) #diff-faf8666ae774f38cdf861d9aca8a35bdd3e63c4cc5222a2af8a5987e3111e7d7R26" target="_blank" rel="nofollow noopener">github.com/Netatalk/Netat…
English
1
0
2
228