crazyman_army (@crazymanarmy) 's Twitter Profile
crazyman_army

@crazymanarmy

CTFer / APT hunter / RedTeam / BlueTeam
the member of @r3kapig
the leader of @ShadowChasing1
CVE-2022-30190
find job opportunities
opinions are own not group

ID: 1427918131322789898

linkhttps://crazymanarmy.github.io/ calendar_today18-08-2021 09:00:01

4,4K Tweet

5,5K Followers

2,2K Following

Akamai Security Intelligence Group (@akamai_research) 's Twitter Profile Photo

Today’s Theme is vulnerability 👀 Akamai researchers have discovered a vuln in Windows Themes that can trigger an authentication coercion - with almost zero user interaction. User views the file, Explorer sends SMB packets with credentials. Full post: akamai.com/blog/security-…

sehno (@_sehno_) 's Twitter Profile Photo

I've just launched Mobile Dojo on my github : github.com/sehno/MobileDo… ! A place to collect vulnerable mobile applications and practice hacking skills. Some of the challenge walkthrough will be added soon. If you know other recent vulnerable mobile application, leave a comment ;)

I've just launched Mobile Dojo on my github : github.com/sehno/MobileDo… ! A place to collect vulnerable mobile applications and practice hacking skills. Some of the challenge walkthrough will be added soon. If you know other recent vulnerable mobile application, leave a comment ;)
Trail of Bits (@trailofbits) 's Twitter Profile Photo

Read about two seemingly unrelated vulnerabilities, a DoS hidden in JWTs and an oversight within the Linux kernel, that we found in open-source software. Tl;dr security assessments are more important than ever in 2024. buff.ly/3V9csR7

xvonfers (@xvonfers) 's Twitter Profile Photo

(CVE-2024-1694???)[$5000][1505686][Updater]EoP in GoogleUpdate with Windows(can be exploited by an attacker to gain SYSTEM privileges on a PC with Google Chrome). issues.chromium.org/issues/40946325

(CVE-2024-1694???)[$5000][1505686][Updater]EoP in GoogleUpdate with Windows(can be exploited by an attacker to gain SYSTEM privileges on a PC with Google Chrome).
issues.chromium.org/issues/40946325
Synacktiv (@synacktiv) 's Twitter Profile Photo

Interested in vulnerability research on security cameras? In our latest blogpost, cleptho provides detailed insights on the analysis of the Arlo Pro 4 firmware format to get you just an RSA key away from bootstrapping your own research: synacktiv.com/publications/a…

NetSPI (@netspi) 's Twitter Profile Photo

[Blog] CVE-2024-21378 – Microsoft Outlook Remote Code Execution How we discovered & were able to exploit this vulnerability: ow.ly/L29F50QQ7s4 Written by: Rich Wolferd, NetSPI’s Director of Red Team Operations & Nick Landers monoxgas

[Blog] CVE-2024-21378 – Microsoft Outlook Remote Code Execution 

How we discovered & were able to exploit this vulnerability: ow.ly/L29F50QQ7s4

Written by: Rich Wolferd, NetSPI’s Director of Red Team Operations &amp; Nick Landers <a href="/monoxgas/">monoxgas</a>
Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Today we are disclosing a critical SSRF vulnerability, CVE-2023-49785, in a popular Gen AI chatbot, NextChat a.k.a ChatGPT-Next-Web. This disclosure comes 107 days after initial report. There is no patch at this time. horizon3.ai/attack-researc…

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

I'm pumped to announce the release of Misconfiguration Manager, a knowledge base and how-to for both offensive and defensive SCCM attack path management, that Duane Michael, Garrett Foster, and I have been working on! Check it out and let us know what you think! posts.specterops.io/misconfigurati…

r3kapig (@r3kapig) 's Twitter Profile Photo

After two days of hard work we finally completed the all challenge of Cyber Apocalypse 2024: Hacker Royale challenge and came in 5th place! And congrats to Friendly Maltese Citizens 1st place 🥇, Flat Network Society 2nd place 🥈, Synacktiv 3rd place 🥉, RedHazzarTeam 4th place.

After two days of hard work we finally completed the all challenge of Cyber Apocalypse 2024: Hacker Royale challenge and came in 5th place! And congrats to <a href="/malta_ctf/">Friendly Maltese Citizens</a> 1st place 🥇, <a href="/FlatNetworkOrg/">Flat Network Society</a>  2nd place 🥈, <a href="/Synacktiv/">Synacktiv</a> 3rd place 🥉, RedHazzarTeam 4th place.
RyotaK (@ryotkak) 's Twitter Profile Photo

Is anyone able to execute arbitrary JavaScript with the following snippets? This is a real-world problem that I encountered while hunting on the bug bounty program, so I'm happy to split the bounty if anyone finds the solution! Details: gist.github.com/Ry0taK/5ce7be0…

Is anyone able to execute arbitrary JavaScript with the following snippets?
This is a real-world problem that I encountered while hunting on the bug bounty program, so I'm happy to split the bounty if anyone finds the solution!

Details: gist.github.com/Ry0taK/5ce7be0…
Sonar Research (@sonar_research) 's Twitter Profile Photo

✉️RE: FWD: calc.exe Overcoming 2 sanitizers, sandboxed iframe, CSP, and SOP to achieve RCE on Mailspring: sonarsource.com/blog/reply-to-… Yours sincerely, calc.exe #appsec #security #vulnerability

n132 (@n132xxx) 's Twitter Profile Photo

Now people can't guess the heap base address easily. The original vulnerability: If we can leak the PIE we can brute force the heap base and we can even overflow from BSS to the heap. github.com/n132/BeapOverf… It's also the first time I reported a Linux kernel vulnerability!

Now people can't guess the heap base address easily.

The original vulnerability: If we can leak the PIE we can brute force the heap base and we can even overflow from BSS to the heap. 

github.com/n132/BeapOverf…

It's also the first time I reported a Linux kernel vulnerability!
XCTF (@xctf_league) 's Twitter Profile Photo

Hey! The #DubheCTF 2024 is coming! 👏 📷📷:dubhectf2024.xctf.org.cn ⏰:2024.03.16 01:00-03.18.01:00(UTC)

Hey! The #DubheCTF 2024 is coming! 👏 
📷📷:dubhectf2024.xctf.org.cn 
⏰:2024.03.16 01:00-03.18.01:00(UTC)