Jake Miller (@thebumblesec) 's Twitter Profile
Jake Miller

@thebumblesec

Web Security Researcher | h2c smuggling, JSON Interop vulns,
RMIScout, GadgetProbe, Server-side Spreadsheet Injection | AppSec @BrexHQ; formerly @BishopFox

ID: 861328358

linkhttps://thebumble.io/ calendar_today04-10-2012 12:38:37

438 Tweet

2,2K Takipçi

384 Takip Edilen

Kev (@kevin_backhouse) 's Twitter Profile Photo

This is very clever: renaming the process to "a\rUid: 0\rGid: 0"! Absolutely kicking myself that I didn't think of that when I was working on an exploit for Apport a little while ago.

The Hacker News (@thehackersnews) 's Twitter Profile Photo

I Own your Cloud Shell... Taking over “Azure Cloud Shell” Kubernetes Cluster Through Unsecured Kubelet API hencohen10.medium.com/i-own-your-clo… [30,000$ Bug Bounty] via Chen Cohen

I Own your Cloud Shell...

Taking over “Azure Cloud Shell” Kubernetes Cluster Through Unsecured Kubelet API

hencohen10.medium.com/i-own-your-clo…

[30,000$ Bug Bounty]

via <a href="/chencococococo/">Chen Cohen</a>
Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

A short post to address an exploit chain I did in last year. Both slides and YouTube video are online now - A Journey Combining Web Hacking and Binary Exploitation in Real World! blog.orange.tw/2021/02/a-jour…

James Kettle (@albinowax) 's Twitter Profile Photo

JSON Interoperability vulnerabilities sound like they have some serious bug-bounty potential. Nice work once again by Jake Miller/Bishop Fox labs.bishopfox.com/tech-blog/an-e…

Dominic (@dee__see) 's Twitter Profile Photo

I used Radamsa to fuzz and find an inconsistency between 2 NodeJS URL parsers and bypass host whitelisting in Kibana webhooks. The impact was low here but the parser issue can probably cause some trouble in other Node code bases. Read more details 👇 blog.deesee.xyz/fuzzing/securi…

Mark Manning (@antitree) 's Twitter Profile Photo

Istio vulnerability with an 8.2 CVSS. They're calling it a 0day. Also a lesson in JWT validation mistakes. > If a JWT token is presented with an issuer that does not match the issuer field specified in JwtProvider, then the request is mistakenly accepted groups.google.com/g/envoy-securi…

Jake Miller (@thebumblesec) 's Twitter Profile Photo

Excited to share that I have just started a new position on the AppSec team @BrexHQ! Looking forward to being a part of their awesome team :)

Pew (@thegrandpew) 's Twitter Profile Photo

Found another jndi bypass like 🟠's groovy bypass using org.yaml.snakeyaml.Yaml. Heres a controller for rouge-jdni to add it to your arsenal gist.github.com/TheGrandPew/74….

shubs (@infosec_au) 's Twitter Profile Photo

Check out our blog post on Context Aware Content Discovery blog.assetnote.io/2021/04/05/con… - we drop a tool (Kiterunner - github.com/assetnote/kite…) and some datasets. Hope you can find more endpoints through our work!

MOGWAI LABS GmbH (@mogwailabs) 's Twitter Profile Photo

It seems that there is a lot confusion about the log4j JNDI injection vulnerability (CVE 2021-44228). In our latest blog post we provide additional background fundamentals about JNDI and JNDI exploitation (and a lot of links): mogwailabs.de/en/blog/2021/1…

Jake Miller (@thebumblesec) 's Twitter Profile Photo

Amazing work James Kettle! I’m just blown away with your creativity in finding new desync variants. I’m looking forward to trying it out in the labs.