Cam
@secretlyhidden1
Former full time bug bounty hunter - now doing security stuff at places :)
ID: 4014880575
22-10-2015 06:11:20
198 Tweet
1,1K Followers
222 Following
Shoutout to the Google VRP (Google Bug Hunters) as well! They were amazing to work with and fixed everything quickly! I’m excited to share some of my techniques for hunting on Google.
This week's Patch Tuesday included 8 CVEs that Rohit Mothe and I found! We've been focusing on findings ways to bypass MapUrlToZone and found several very interesting ways to confuse it. This is an API we've seen a lot of interest in lately, so good to have it locked down!
Now that the smoke has settled wanted to tweet about the amazing Zero Day Quest event the Microsoft Security Response Center held. The planning, coordination, and effort all the teams put into making it an amazing event for our top researchers was truly admirable. It was great seeing everyone!
I’m horrible at photos but here are some from the event at the space needle and mariners game! Again truly amazing event and look forward to future research from everyone! Microsoft Security Response Center thank you for including me!
If you wanna see some interesting Google vulns I found my Nullcon talk covers them ;) Shoutout the Google VRP (Google Bug Hunters) team!
Microsoft DevOps on Azure Microsoft Security Visual Studio Microsoft Security Response Center [5/7] 🛡️ MITIGATION: Microsoft states "This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take." The fix corrects how the Visual Studio updater handles pipeline tokens. Credit to Cameron Vincent at Microsoft for this
At DEF CON 33, George Hughey (George Hughey) and Rohit Mothe (Rohit Mothe), Senior Security Research Managers at MSRC, took us back to the 90s with their talk on the ghost of Internet Explorer in Windows: MapUrlToZone. They uncovered how this legacy API, used by Outlook, Office,