604 Followers
475 Following
656 Posts
Sentient one-liner grepping the Internet for signs of intelligence.
GitHubhttps://github.com/wvu

New whitepaper and exploit code from @stephenfewer on 5 new vulnerabilities he chained to achieve unauthenticated RCE on Lorex 2K Indoor Wi-Fi security cameras. The exploit works in two phases and comprises an auth bypass, a stack-based buffer overflow, an out-of-bounds heap read, and a null pointer dereference — and that's just to start (because it was, like, Tuesday for Stephen or whatever) 📈

Whitepaper: https://www.rapid7.com/globalassets/_pdfs/research/pwn2own-iot-2024-lorex-2k-indoor-wi-fi-security-camera-research.pdf

Exploit: https://github.com/sfewer-r7/LorexExploit

Rapid7's vuln research team is expanding! Remote UK role open for folks who wanna hack on enterprise software (plus like, a shitload of network appliances because *gestures at everything*), write some exploits, and work with cool people like @stephenfewer and @fuzz 🤩 #remotejob https://careers.rapid7.com/jobs/senior-security-researcher-united-kingdom
Senior Security Researcher - United Kingdom

Rapid7's vulnerability and exploit research team does industry-leading attack research that prioritizes and uncovers risk for organizations worldwide. We’re looking for an experienced vulnerability researcher to contribute to overall research team goals, helping defenders get ahead of the curve on emergent threats and keeping Rapid7 top of mind for industry audiences. You’ll work with a skilled group of technical and cross-team leaders who are highly collaborative and deeply embedded in the security community. About the TeamRapid7 vuln researchers find and disclose zero-day vulnerabilities, write in-depth analyses of n-day bugs, develop Metasploit modules, identify patterns in emerging and established attack surface area,...

TIL: Some surprising code execution sources in bash

👉W00t! ANOTHER open req @ GreyNoise! 👀

This one is on the team that built & will continue to innovate our next-gen global observation grid that REDACTS w/bad guys, ruins their days, & helps keep orgs + folks safe.

Hit up bob at greynoise.io if you have q's.

https://boards.greenhouse.io/greynoiseintelligence/jobs/4499845005?gh_jid=4499845005

Senior Software Engineer

United States or Remote

Dutch researchers @midnightbluelab
found a critical zero-click vuln in a photo app enabled by default on Synology storage devices, putting millions of systems at risk of being hacked. They found Synology systems owned by police/law firms/critical infrastructure contractors online and all vulnerable to attack. Synology has called the vuln "critical" and issued a patch last week but apparently didn't notify customers. Synology devices don't have automated update capabilities. Here's my story: https://www.wired.com/story/synology-zero-click-vulnerability/
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack

A vulnerability categorized as “critical” in a photo app installed by default on Synology network-attached storage devices could give attackers the ability to steal data and worse.

WIRED
Super dope write-up of Acronis Cyber Infrastructure CVE-2023-45249 by an AttackerKB community member here — remote command execution via default password, reported exploited in the wild a while back. https://attackerkb.com/assessments/11c1c3e7-7035-4201-85d8-100b3c567e5b
h00die-gr3y's assessment of CVE-2023-45249 | AttackerKB

On 24 July, Acronis published the security advisory SEC-6452: Remote command execution due to use of default passwords where default passwords are exploited to…

AttackerKB
"yesterdays" are now what I'm using to describe vulnerabilities that have been around for ages, are known, have CVEs, but didn't have enriched data so people didn't realize they existed and then all start freaking out about "0-days".
It should be illegal to paywall basic security features.
It should be illegal to paywall basic security features.
It should be illegal to paywall basic security features.
It should be illegal to paywall basic security features.
It should be illegal to paywall basic security features.
It should be illegal to paywall basic security features.
Brutal. All it took was a little semgrep to find 14 new WordPress plugin vulnerabilities.

projectblack.io/blog/cve-hunting-at-scale/
CVE Hunting Made Easy

In just three Sunday afternoons, I discovered 14 CVEs - and you can too! CVE hunting is more accessible than many realise, and the methodology outlined here requires only a bit of coding knowledge.

Research Blog | Project Black
You realize how bad software is once you've been on both sides of it.