Stephen Sims

4.3K posts

Stephen Sims banner
Stephen Sims

Stephen Sims

@Steph3nSims

Perpetual Student | SANS Fellow | Musician | Braggart Hater | Gray Hat Hacking | VR | 🏂 | deadcode | https://t.co/CadJehomsU

Berkeley, CA Katılım Şubat 2014
858 Takip Edilen25.8K Takipçiler
Stephen Sims
Stephen Sims@Steph3nSims·
I’m almost done assembling the author team for the 7th edition of Gray Hat Hacking through McGraw-Hill. I can’t wait to share with the amazing team of authors with you!
English
1
0
33
1.5K
Stephen Sims
Stephen Sims@Steph3nSims·
I've been regularly blocking anyone who posts a tweet starting with "Holy S#!t" (or similar) and it's done wonders for my mental health around getting worked up over AI FUD! I figured I'd share in case it helps.
English
3
0
25
1.7K
Stephen Sims
Stephen Sims@Steph3nSims·
The CFP opens on June 1st. The first year of the conference was last October and was a fantastic event. If you're working in the offensive or adversarial AI space I highly recommend submitting to the CFP and look forward to reviewing your submission along with the team.
Offensive AI Con@OffensiveAIcon

We’re proud to introduce the Offensive AI Con 2026 Review Board. This year, we’ve brought together 12 of the most respected minds across offensive security, AI research, and real-world adversarial operations to help shape the direction of OAIC. The CFP opens June 1st!

English
0
2
16
2.5K
Stephen Sims
Stephen Sims@Steph3nSims·
@thedawgyg I imagine that in the future the amount paid for high value bounties will go up due to the decrease in exploitable bugs available to find once AI is fully integrated into CI/CD pipelines. At least from exploit acquisition companies.
English
1
1
21
1.6K
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Even Google is reducing bounty amounts.... "We will be reducing some of our reward amounts and bonuses across Android and Chrome. While these adjustments may reduce the payout for a single bug report, we continue to prioritize our VRPs and the total aggregate rewards paid out in 2026 is expected to increase." Yet when I was trying to tell people this would happen a few months ago, people said i was an idiot... lol... If even Google is reducing bounties do you really think these significantly smaller companies arent going to do the same thing?
Google VRP (Google Bug Hunters)@GoogleVRP

📣📢 Calling all Android and Chrome bug hunters 🧑‍💻🔎! We're updating our Android & Chrome VRP programs to ensure we can continue to reward the most challenging and impactful vulnerabilities researchers find in our products. For details, 👇 bughunters.google.com/blog/evolving-…

English
17
6
206
20.9K
Stephen Sims
Stephen Sims@Steph3nSims·
We at @offby1security saw an interesting defense against AI-powered offensive agents recently. Fingerprinting of the agents performing the testing resulted in misleading, honeypot-like responses, attempting to distract or redirect them. It didn't work but worth noting.
English
3
2
21
1.8K
Stephen Sims retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
Exploiting Reversing (ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03) Today I am releasing the nineth article in the Exploiting Reversing Series (ERS). In “Exploitation Techniques | CVE-2024-30085 (Part 09)” I provide a 106-page deep dive and a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/04/28/exp… Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit editions built on the cldflt.sys heap overflow. [+] PreviousMode Edition: Exploit cldflt.sys via WNF OOB + Pipe Attributes + ALPC + _KTHREAD.PreviousMode flip: elevation of privilege of a regular user to SYSTEM. [+] PPL Bypass Edition: Exploit cldflt.sys via WNF OOB + PreviousMode flip + _EPROCESS.Protection strip + MiniDumpWriteDump: elevation of regular user to SYSTEM. [+] Solid Reliability: Two complete, stable exploits, including a multi-step cleanup phase that restores the corrupted pipe attribute Flink and _KTHREAD.PreviousMode before process exit, preventing crash on cleanup. This article guides you through two additional techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow. While demonstrated here, these methods can be adapted as exploitation techniques for many other kernel targets. I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback! I would like to thank Ilfak Guilfanov (@ilfak) and Hex-Rays SA (@HexRaysSA) for their constant and uninterrupted support, which has been vital in helping me produce this series. The following articles will continue the miniseries about iOS and Chrome, which are my areas of research. Enjoy the reading and have an excellent day. #exploit #exploitdevelopment #windows #exploitation #vulnerability #minifilterdriver #kernel #heapoverflow
Alexandre Borges tweet media
English
4
61
193
9.8K
Stephen Sims retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the Linux kernel for nine years. Most Linux privilege-escalation bugs are picky. They need a precise timing window (a "race"), or specific kernel addresses leaked from somewhere, or careful tuning per distribution. Copy Fail needs none of that. It is a straight-line logic mistake that works on the first try, every time, on every mainstream Linux box. The attacker just needs a normal user account on the machine. From there, the script asks the kernel to do some encryption work, abuses how that work is wired up, and ends up writing 4 bytes into a memory area called the "page cache" (Linux's high-speed copy of files in RAM). Those 4 bytes can be aimed at any program the system trusts, like /usr/bin/su, the shortcut to becoming root. Result: the next time anyone runs that program, it lets the attacker in as root. What should worry most: the corruption never touches the file on disk. It only exists in Linux's in-memory copy of that file. If you imaged the hard drive afterwards, the on-disk file would match the official package hash exactly. Reboot the machine, or just put it under memory pressure (any normal system load that needs the RAM), and the cached copy reloads fresh from disk. Containers do not help either. The page cache is shared across the whole host, so a process inside a container can use this bug to compromise the underlying server and reach into other tenants. The original sin was a 2017 "in-place optimization" in a kernel crypto module called algif_aead. It was meant to make encryption slightly faster. The change broke a critical safety assumption, and nobody noticed for nine years. That bug then rode every kernel update from 2017 to today. This vulnerability affects the following: 🔴 Shared servers (dev boxes, jump hosts, build servers): any user becomes root 🔴 Kubernetes and container clusters: one compromised pod escapes to the host 🔴 CI runners (GitHub Actions, GitLab, Jenkins): a malicious pull request becomes root on the runner 🔴 Cloud platforms running user code (notebooks, agent sandboxes, serverless functions): a tenant becomes host root Timeline: 🔴 March 23, 2026: reported to the Linux kernel security team 🔴 April 1: patch committed to mainline (commit a664bf3d603d) 🔴 April 22: CVE assigned 🔴 April 29: public disclosure Mitigation: update your kernel to a build that includes mainline commit a664bf3d603d. If you cannot patch immediately, turn off the vulnerable module: echo "install algif_aead /bin/false" > /etc/modprobe.d/disable-algif.conf rmmod algif_aead 2>/dev/null || true For environments that run untrusted code (containers, sandboxes, CI runners), block access to the kernel's AF_ALG crypto interface entirely, even after patching. Almost nothing legitimate needs it, and blocking it shuts the door on this whole class of bug...
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
230
2.7K
11.7K
2.4M
Stephen Sims retweetledi
Halvar Flake
Halvar Flake@halvarflake·
After burning $2.5k on tokens and LLM findings, I have a question about the 270 Firefox bugs: were they all attacker-reachable? The findings I got where often "legitimate bad code" but also "not reachable in any sane scenario".
English
31
19
293
30.3K
☁️
☁️@OneCloudEmoji·
@Steph3nSims it continues to amaze me how you are better than me in every aspect of life
English
1
0
1
52
Stephen Sims
Stephen Sims@Steph3nSims·
Would you be interested in a stream on the @offby1security channel covering the costs between using different Frontier models to discover the same vulnerabilities and the changes to the prompts and testing methodologies to find them?
English
7
4
56
2.9K
Stephen Sims retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
The Exploiting Reversing Series (ERS) currently features 945 pages of exploit development based on real-world targets: [+] ERS 08: exploitreversing.com/2026/03/31/exp… [+] ERS 07: exploitreversing.com/2026/03/04/exp… [+] ERS 06: exploitreversing.com/2026/02/11/exp… [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04: exploitreversing.com/2025/02/04/exp… [+] ERS 03: exploitreversing.com/2025/01/22/exp… [+] ERS 02: exploitreversing.com/2024/01/03/exp… [+] ERS 01: exploitreversing.com/2023/04/11/exp… In the coming weeks, I will publish new articles covering exploration in areas such as Windows, Chrome, iOS/macOS, and hypervisors. Have a great day and enjoy reading. #exploit #exploitation #windows #chrome #macOS #iOS #hypervisors #vulnerabilityresearch
Alexandre Borges tweet media
English
2
107
447
20.2K