Randori Attack Team (@randoriattack) 's Twitter Profile
Randori Attack Team

@randoriattack

Trusted Adversary @RandoriSecurity | Exploit Development | Offensive Operations | #InfoSec tweets only | Managed by @syndrowm @pwnpnw @aaronportnoy

ID: 1131602268434812928

linkhttps://www.randori.com/category/ttps/ calendar_today23-05-2019 16:46:19

96 Tweet

2,2K Followers

60 Following

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

The Randori Attack Team has developed a working exploit and has been able to successfully leverage this vulnerability. Check out our analysis here: randori.com/blog/cve-2021-…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

The Randori Attack Team can confirm the exploitability of unpatched Jamf Pro on-prem via "Log4Shell". Due to the severity of impact, we recommend organizations patch immediately. See: randori.com/blog/jamf-pro-…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

Not able to attend our webinar on #Log4j with GreyNoise? Click to watch the recording and get expert insights into researching and remediating Log4Shell, with @HexadeciMoose Aaron Portnoy Andrew Morris (afk), and Remi. vital.wistia.com/medias/qo6vlom…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

New high severity DoS in OpenSSL just released: openssl.org/news/secadv/20… CVE-2022-0778 was reported by Tavis Ormandy and appears to affect systems that parse user-supplied certificates.

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

CVE-2022-22965 has been assigned to the #SpringShell vulnerability. Spring framework 5.3.18 and 5.2.20 have been released to address the issue: spring.io/blog/2022/03/3…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

The Randori Attack Team developed a working exploit for #f5 BIG-IP CVE-2022-1388. To help the #infosec community assess their risk, we published our technical analysis and a bash one-liner that organizations can run to test exploitability. Details here: randori.com/blog/vulnerabi…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

We have validated Rapid7’s analysis on CVE-2022-26134, an RCE in Atlassian Confluence. Randori recommends assuming compromise and investigating accordingly. Vendor guidance is available here: confluence.atlassian.com/doc/confluence…

Randori Attack Team (@randoriattack) 's Twitter Profile Photo

OpenSSL released details for CVE-2022-3602 & CVE-2022-3786. Due to the mitigating factors outlined in our post we do not believe these will be exploited for remote code execution in real-world scenarios: randori.com/blog/openssl-v…

chompie (@chompie1337) 's Twitter Profile Photo

In collaboration with Fabius and Aaron Portnoy we conducted a post mortem of the QueueJumper MSMQ RCE patch. We do an in depth RCA, identify variants, create exploit primitives, evaluate exploitability, and make some interesting new discoveries! securityintelligence.com/posts/msmq-que…