Simon Scannell

@scannell_simon

I like to learn by breaking things. Vulnerability Research

~
Регистриран през октомври 2018 г.

туита

Блокираш @scannell_simon

Наистина ли искаш да видиш тези туитове? Това няма да разблокира @scannell_simon

  1. Закачен туит
    14.05

    Really happy to publish something again. I have to admit I'm proud of the info leak, it enabled the exploit to be 100% reliable. We might publish the exploit code soon

    Отмяна
  2. ретуитна
    12.10

    Our research team enjoyed a great and presented "A Common Bypass Pattern to Exploit Modern Web Apps". Stay tuned for the slides.

    Отмяна
  3. 11.10
    Отмяна
  4. ретуитна
    4.10

    will talk about A Common Bypass Pattern to Exploit Modern Web Apps at . Make sure to get your ticket on time:

    Отмяна
  5. ретуитна
    14.08

    The plural of regex is regrets

    Отмяна
  6. ретуитна
    12.08

    MyBB fixed a Persistent XSS (CVE-2021-27279) in MyBB < 1.8.25 found by our researcher Igor Sak-Sakovskiy. RCE is possible when chained with CVE-2021-27890, reported by Simon Scannell & Carl Smith. Advisory:

    Показване на тази нишка
    Отмяна
  7. ретуитна
    5.08

    Tired of hopping between boring programs? We are looking for full-time and vulnerability researchers to join our R&D team and uncover impactful bugs in popular open-source projects:

    Отмяна
  8. ретуитна
    2.08

    We are excited that our security researchers and are honored with a nomination for this year's ... - Best Client-Side Bug (RCE through CS:GO) - Best Privilege Escalation Bug (CVE-2020-27194) - Most Under-Hyped Research (Composer)

    Отмяна
  9. ретуитна
    29.07

    So excited to finally release my blog post- Kernel Pwning with eBPF: a Love Story. I cover eBPF, the verifier, debugging, exploitation, mitigations and other cool findings! I do root cause analysis and exploit CVE-2021-3490 for LPE with PoC included.

    Показване на тази нишка
    Отмяна
  10. ретуитна
    28.07

    We discovered a and code vulnerability in Zimbra webmail that could enable attackers to steal all emails of an organization by sending one malicious email. Learn more in our new blog post:

    Отмяна
  11. 27.07

    Really happy to have published something again, especially web stuff! pre-auth Stored XSS in email body + SSRF

    Отмяна
  12. ретуитна
    14.07

    Yet another Linux kernel exploitation write-up! CVE-2021-22555: Turning \x00\x00 into 10000$

    Отмяна
  13. ретуитна
    18.05

    My first blog post as a vulnerability researcher is up 🎉 Check it out to learn about blind and error-based NoSQL injections in RocketChat that ended up giving me RCE!

    Отмяна
  14. ретуитна
    16.05
    Отмяна
  15. ретуитна
    15.05

    I've written multiple OSes, dozens of compilers, and even developed entirely new algorithms. I'm a high-school dropout.

    Отмяна
  16. ретуитна
    27.04
    Отмяна
  17. ретуитна
    13.04
    Отмяна
  18. ретуитна
    12.04

    I wonder if it's possible to challenge H1 legally for enforcing unlimited NDA on those bug reports while never acting on them? do you know of any precedent?

    Показване на тази нишка
    Отмяна
  19. ретуитна
    12.04

    Valve ignoring security researchers is not just specific to the secret club. Here we see Bien Pham demonstrate his Remote Code Execution exploit that has not been patched for over a year.

    Отмяна
  20. ретуитна
    11.04

    Two years ago, slidybat reported a remote code execution affecting Team Fortress 2. It can be triggered by joining a community server. It has yet to be patched.

    Показване на тази нишка
    Отмяна

Изглежда зареждането отнема известно време.

Twitter може да е претоварен или да изпитва моментно затруднение. Опитай отново или виж Twitter Status за повече информация.

    Може също да харесаш

    ·