TC
@tcs3c
father of three - h4ck3r of stuff - lover of life - singer of songs | pwning at @codewhitesec
ID: 2236620765
21-12-2013 16:05:16
126 Tweet
149 Followers
213 Following
Unauth'd admin access to #SAP #Netweaver? Our very own Kai Ullrich has you covered, see #CVE-2021-21481 and SAP Security Note 3022422. Better patch than sorry. Our customers got their heads-up already and we'll publish a detailed blog post when appropriate.
Read about what Kai Ullrich does „on a rainy sunday afternoon when the kids are busy with someone else“. 😎 Finest #SAP exploitation - enjoy!
Getting RCE with a Razor! Our walk-through of CVE-2021-22941 affecting Citrix ShareFile Storage Zones Controller by Markus Wulftange is now live codewhitesec.blogspot.com/2021/09/citrix…
At CODE WHITE GmbH the interns write their own C2 frameworks.. What‘s next?! 😎
Bypassing .NET Serialization Binders: case studies for DevExpress (CVE-2022-28684) and Microsoft Exchange (CVE-2022-23277) by Markus Wulftange codewhitesec.blogspot.com/2022/06/bypass…
Congratulations to all participants and a major thanks to all our supporters! Fraunhofer AISEC TNG Technology Consulting GmbH CODE WHITE GmbH heise online and LixLab
If you're into client virtualization with #QubesOS, use #KeePassXC and #rofi, our very own Tobias Neitzel has you covered with a nice frontend which makes your credential usage a little bit easier 😎 github.com/codewhitesec/q…
Even though JMX exploitation is well understood, Markus Wulftange and Tobias Neitzel found new universal exploitation techniques & one of them allows to gain instant Remote Code Execution using TemplatesImpl (which is now implemented in #beanshooter) codewhitesec.blogspot.com/2023/03/jmx-ex…