Anthony Weems (@amlweems) 's Twitter Profile
Anthony Weems

@amlweems

Cloud Vulnerability Research • The opinions stated here are my own, not those of my company.

ID: 14378227

linkhttp://amlw.dev calendar_today13-04-2008 21:43:53

178 Tweet

3,3K Followers

267 Following

Anthony Weems (@amlweems) 's Twitter Profile Photo

My team Praetorian just published our work in reverse engineering the Proxylogon patches for CVE-2021-26857, CVE-2021-26855, and CVE-2021-27065. I learned a lot more about Exchange than I thought I'd ever need, but had a blast. praetorian.com/blog/reproduci…

Anthony Weems (@amlweems) 's Twitter Profile Photo

Just finished Portswigger's new Burp Suite Certification. I've always been a huge fan of the Web Security Academy and this is an excellent capstone on the labs. Thanks PortSwigger for all the educational content! #burpsuitecertified

Anthony Weems (@amlweems) 's Twitter Profile Photo

I'm really excited for this video! I got a chance to collab with LiveOverflow 🔴 and share the process for discovering the localhost bypass for CVE-2021-45046 with code review and differential fuzzing. :)

那个饺子🦆(JJ) (@thatjiaozi) 's Twitter Profile Photo

github.com/google/securit… Our research on the deep mines of the JPX standard is now public. I had the pleasure and the privilege to work with Simon Scannell , Anthony Weems and Ezequiel Pereira on this one. Pretty interesting client side info leak vector :)

Anthony Weems (@amlweems) 's Twitter Profile Photo

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)

github.com/amlweems/xzbot
Anthony Weems (@amlweems) 's Twitter Profile Photo

Excited to share this blog post about server-side memory corruption that my team exploited in production. Shout-out to Simon Scannell, Ezequiel Pereira, and 那个饺子🦆(JJ) - this was a very fun project. :-) bughunters.google.com/blog/622075742…

Phil Venables (@philvenables) 's Twitter Profile Photo

Cloud CISO Perspectives Blog for mid-October ‘24 is up covering: - Sharing AI vulnerability research - Virtual red teams - Advances in DDoS mitigation - Securing inherited cloud deployments - Can AI keep a secret? - and more….. cloud.google.com/blog/products/…

Anthony Weems (@amlweems) 's Twitter Profile Photo

Before joining Google, I submitted some Cloud bugs to the Google Vulnerability Rewards Program (VRP). Today, we announced a dedicated Cloud VRP and I'm so excited to be a part of the program that got me into Google in the first place. Send us vulnz 🙂 cloud.google.com/blog/products/…

Anthony Weems (@amlweems) 's Twitter Profile Photo

Effective today, Google will issue CVEs for critical vulnerabilities in Google Cloud that are fixed internally and do not require customer action or patching. cloud.google.com/blog/products/…

Anthony Weems (@amlweems) 's Twitter Profile Photo

🕺"Leaving tradition" is one of the best parts of Google's security culture and has led to some of the most interesting attack chains I've gotten to work on. There's nothing quite like starting with a blank slate and ending with a root shell.💃