straightblast

70 posts

straightblast

straightblast

@straight_blast

Katılım Ocak 2017
54 Takip Edilen1.3K Takipçiler
straightblast
straightblast@straight_blast·
My good friend @darkfloyd1014 and his crew will be hosting the VXcon security conference vxcon.hk in Hong Kong 🇭🇰 this year. It will be packed with great talks. Security enthusiasts in the Asia Pacific area should go check it out.
English
0
0
1
1.3K
Cedric Halbronn
Cedric Halbronn@saidelike·
Hey twitterverse, security friends and previous colleagues, I am going to leave NCC Group at the end of this week, after 9+ years of great stuff. Time for a change :)
English
15
1
132
14K
straightblast retweetledi
RyotaK
RyotaK@ryotkak·
I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack. This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack. flatt.tech/research/posts…
English
15
246
796
121.7K
Moltivie
Moltivie@Rider_Host·
@straight_blast Congratulations on this finding. I have some questions regarding this exploit. Could you please DM me?
English
1
0
0
57
straightblast
straightblast@straight_blast·
The Delinea Secret Server auth bypass vulnerability I discovered earlier this year, that can net access to all stored secrets, has just been assigned CVE-2024-33891. Relive the story - straightblast.medium.com/all-your-secre…
CVE@CVEnew

CVE-2024-33891 Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to … cve.org/CVERecord?id=C…

English
3
1
8
1.6K
straightblast retweetledi
Atredis Partners
Atredis Partners@Atredis·
Last year, Brandon and Ali went looking for new attack surface area in Microsoft Exchange. Ultimately, they were able to crash the Exchange file scanner by simply sending an email. Read more on our blog: bit.ly/3xVt4Ch
Atredis Partners tweet media
English
0
23
41
7.2K
straightblast retweetledi
Tib3rius
Tib3rius@0xTib3rius·
Unfortunately I have to reshare this as I'm still looking for a position. Had several good initial opportunities but in a lot of cases they were looking for someone less senior and not a web app SME. If your company are hiring specifically web app testers, please DM me. 😁
Tib3rius@0xTib3rius

I am currently looking for a remote, US-based, webapp-focused pentesting position. Though I'm not in a hurry, I understand how long interview processes can be. If you're looking for a candidate with over 12 years experience in the industry, plus the ability to effectively communicate with customers in different roles, develop testing tools on the fly, and spread brand awareness on social media / at conferences, let's talk.

English
7
65
157
44.9K
straightblast retweetledi
Samuel Groß
Samuel Groß@5aelo·
Here are the slides from the "Attacking JavaScript Engines in 2022" talk by @itszn13 and myself @offensive_con. It's a high-level talk about JS, JIT, various bug classes, and typical exploitation flows but with lots of references for further digging! saelo.github.io/presentations/…
English
6
254
725
0
straightblast retweetledi
maxpl0it
maxpl0it@maxpl0it·
- Use-after-frees from JIT - CodeQL for variant analysis - Never-before-seen exploit primitives - Tenured heap tomfoolery I’ve packed just about everything in this post!
SentinelOne@SentinelOne

🦊New on #SentinelLabs! Learn how to dive into JIT compilers in #JavaScript engines and follow along as we find a new set of exploit primitives in this previously patched bug. By @maxpl0it. Read the blog: sentinelone.com/labs/firefox-j… #firefox #cybersecurity #infosec

English
4
61
234
0
Richard Johnson
Richard Johnson@richinseattle·
Excited to be joining the Advanced Threat Research team as part of the newly formed Trellix company. You can expect to see some new public facing vulnerability research from me in 2022!
Steve Povolny (he/him)@spovolny

Finally able to share this! We are beyond thrilled to welcome @richinseattle to the Trellix Advanced Threat Research team as a senior vulnerability researcher. Rich is a perfect fit for our team and we can't wait to hit the ground running! Welcome Rich!! #trellix #atr

English
21
6
215
0
straightblast
straightblast@straight_blast·
@adamely I believe some countries already adopted such approach. Is there some reason why we don’t see it done (if any) in USA?
English
1
0
0
0
Adam Ely
Adam Ely@adamely·
All restaurants should have a pay by QR code option on the bill. Saves time for both of us.
English
3
0
15
0
straightblast retweetledi
Ian Beer
Ian Beer@i41nbeer·
Today we're publishing a detailed technical writeup of FORCEDENTRY, the zero-click iMessage exploit linked by Citizen Lab to the exploitation of journalists, activists and dissidents around the world. googleprojectzero.blogspot.com/2021/12/a-deep…
English
56
1.5K
4.2K
0
straightblast retweetledi
Maddie Stone
Maddie Stone@maddiestone·
✨ New Workshop! Android Exploits 101 🔥📱 I put together an introductory overview of the "shape" of modern 0-day exploit chains for Android. Hope it's helpful 😊 youtu.be/squuwVQiPgg
YouTube video
YouTube
Maddie Stone tweet media
English
10
210
713
0
straightblast retweetledi
aaron
aaron@arinerron·
Here's a cool project I've been working on during my boring intro CS classes! It's heaptrace, a heap debugger that replaces addresses with symbols to help you understand a program's heap operations. github.com/arinerron/heap…
aaron tweet media
English
5
46
289
0