Hans-Martin Münch (@h0ng10) 's Twitter Profile
Hans-Martin Münch

@h0ng10

CEO of MOGWAI LABS GmbH. I play CTF with powerpuffpwn.

ID: 145454720

linkhttp://mogwailabs.de calendar_today19-05-2010 01:08:44

1,1K Tweet

1,1K Followers

891 Following

Charles Fol (@cfreal_) 's Twitter Profile Photo

As promised, here's how you can attack Roundcube using CVE-2024-2961. Not to be redundant with my @offensivecon talk, I go for a data-only attack, giving more insight into the PHP engine.

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Apache HTTP Server just fixed 7 of my vulnerabilities! I'll be covering 5 of them in my Black Hat USA #BHUSA talk next month! (Still no hope for the VISA, tho 🤷‍♂️) Anyway, stay tuned! 🔥 > httpd.apache.org/security/vulne…

mdowd (@mdowd) 's Twitter Profile Photo

Fun Fact: I found those signal bugs (sendmail and openssh) while writing the chapter on signals for TAOSSA. Writing stuff you think you know well helps you to discover your blind spots, and also consider new ideas!

Hans-Martin Münch (@h0ng10) 's Twitter Profile Photo

The OWASP Top 10 includes nine vulnerability categories (such as 'injection') and one specific vulnerability ('SSRF'). My personal wish for the 2024 release is to remove SSRF and add the 'parsing differentials' category instead. hashtag #owasp #top10

Janggggg (@testanull) 's Twitter Profile Photo

Here is the PoC for MS SharePoint bugs fixed in this month's patch :) Responsible Disclosure is a joke github.com/testanull/MS-S… youtu.be/u8mccaakISw

frycos (@frycos) 's Twitter Profile Photo

My blog post about several findings in Dynamics 365 Business Central. I tried writing in a .NET primer style for code audit beginners. frycos.github.io/vulns4free/202…

MOGWAI LABS GmbH (@mogwailabs) 's Twitter Profile Photo

We just added a new item to our bug parade a.k.a security advisory page: Unauthenticated remote code execution in Visual Planning 8: mogwailabs.de/en/advisories/…

_leon_jacobs(💥) (@leonjza) 's Twitter Profile Photo

We have a long history of yearly artworks Orange Cyberdefense's SensePost Team, and this year I got to carry the baton forward. I'm excited to reveal our 2024 artwork: "make pr's, not war". An art piece almost literally from my heart. 🧵

We have a long history of yearly artworks <a href="/sensepost/">Orange Cyberdefense's SensePost Team</a>, and this year I got to carry the baton forward.

I'm excited to reveal our 2024 artwork: "make pr's, not war". An art piece almost literally from my heart.

🧵
Synacktiv (@synacktiv) 's Twitter Profile Photo

In their latest blogpost, Hugow and Load. developed in-memory post-exploitation payloads to inject and hook common Java applications. Come and see the Java shenanigans involved to interact with the apps from the inside! synacktiv.com/publications/i…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Another product, another deserialization vulnerability, another RCE from Markus Wulftange: Patch your Telerik Report Server (CVE-2024-6327 & CVE-2024-6096) code-white.com/public-vulnera…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Following on from our #GitHub action exploitation series, Hugow discovered a new exploitation technique that allowed us to push arbitrary code onto the spring-security project using the Dependabot GitHub app. synacktiv.com/publications/g…

MOGWAI LABS GmbH (@mogwailabs) 's Twitter Profile Photo

We just added a new vulnerability to our "bug parade" page (CVE-2024-37361). If you are using Pentaho Data Integration, please ensure that you are on the latest patch level to avoid potential security risks. mogwailabs.de/en/advisories/…

esjay (@esj4y) 's Twitter Profile Photo

First part which covers the bug and finishes off with code allowing us for a controlled overflow in the Paged Pool is up: 3sjay.github.io/2024/09/08/Win…

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Happy Monday! watchTowr Labs member SinSinology deep dives into Veeam Backup & Response CVE-2024-40711 in our latest post 🚀 labs.watchtowr.com/veeam-backup-r… We hope you enjoy it! (as always, where there's smoke - there is fire 😉 for next time..)

Michael Eder @edermi@infosec.exchange (@michael_eder_) 's Twitter Profile Photo

Some time ago, I found a vulnerability in a customer's remote access (Citrix) configuration that allowed bypassing MFA under certain conditions. If you're interested, here are the details: edermi.github.io/post/2024/mfa_…