shubs (@infosec_au) 's Twitter Profile
shubs

@infosec_au

Co-founder, security researcher. Building an attack surface management platform, @assetnote

ID: 1674598830

linkhttps://assetnote.io calendar_today16-08-2013 02:55:36

4,4K Tweet

51,51K Followers

1,1K Following

Thomas Rinsma (@thomasrinsma) 's Twitter Profile Photo

Here is part 2 of our Ghostscript research series. This is about CVE-2024-29511, a fun combination of logical bugs and features, in the end allowing to read and write files outside the SAFER sandbox. codeanlabs.com/blog/research/…

shubs (@infosec_au) 's Twitter Profile Photo

I'm hosting an in-person bug bounty meetup in Sydney at UNSW, and you can RSVP here: h1.community/events/details… I hope anyone in Sydney who is interested in bounties can make it. :) I'll be presenting and answering questions on hacking on bug bounties for the last ten years.

frycos (@frycos) 's Twitter Profile Photo

My blog post about several findings in Dynamics 365 Business Central. I tried writing in a .NET primer style for code audit beginners. frycos.github.io/vulns4free/202…

Sam Curry (@samwcyo) 's Twitter Profile Photo

Super stoked to be giving a DEF CON talk about vulnerabilities in ISP infrastructure! This was originally a blog post, but the talk will include a lot more context and vulnerabilities affecting wider ISP ecosystem (see: defcon.org/html/defcon-32…) 🫡

Super stoked to be giving a DEF CON talk about vulnerabilities in ISP infrastructure! This was originally a blog post, but the talk will include a lot more context and vulnerabilities affecting wider ISP ecosystem (see: defcon.org/html/defcon-32…) 🫡
shubs (@infosec_au) 's Twitter Profile Photo

Our security researcher hashkitten found one of the most critical exploit chains in the history of Assetnote. Affecting 40k+ instances of ServiceNow, we could execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…

Our security researcher <a href="/hash_kitten/">hashkitten</a> found one of the most critical exploit chains in the history of <a href="/assetnote/">Assetnote</a>. Affecting 40k+ instances of ServiceNow, we could  execute arbitrary code, access all data without authentication. You can read our blog here: assetnote.io/resources/rese…
Sonar Research (@sonar_research) 's Twitter Profile Photo

🔥 XSS on any website with missing charset information? 😳 Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post: sonarsource.com/blog/encoding-… #appsec #security #vulnerability

🔥 XSS on any website with missing charset information? 😳

Attackers may leverage the ISO-2022-JP character encoding to inject arbitrary JavaScript code into a website. Read more in our latest blog post:

sonarsource.com/blog/encoding-…

#appsec #security #vulnerability
BSidesCanberra (@bsidescbr) 's Twitter Profile Photo

#BSidesCbr24 Speaker Announcement: "Insecurity through Censorship: Vulnerabilities Caused by The Great Firewall" by shubs and Michael Gianarakis cfp.bsidescbr.com.au/bsides-canberr…

withad (@w1th4d) 's Twitter Profile Photo

Here's a teaser on something I've been working on for a while. It's a tool to inject malicious code into existing JAR files (Java apps or libraries). The implant is triggered when the JAR is used and runs in the background. The app/lib runs as usual. More on this later.

Here's a teaser on something I've been working on for a while. It's a tool to inject malicious code into existing JAR files (Java apps or libraries).

The implant is triggered when the JAR is used and runs in the background. The app/lib runs as usual.

More on this later.
Source Incite (@sourceincite) 's Twitter Profile Photo

Time to retire some content! JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: srcincite.io/blog/2024/07/2…

shubs (@infosec_au) 's Twitter Profile Photo

If you're in Melbourne and interested in our recent ServiceNow disclosure, my very talented colleague hashkitten is presenting at Ruxmon on the 26th of July: meetup.com/en-AU/ruxmon/e…

shubs (@infosec_au) 's Twitter Profile Photo

This is really amazing research. I appreciate how well they articulated it, and I hope additional tooling is built to make this a more accessible attack in the future. The concurrent limit allowed for Node.js is worth noting too. Great work RyotaK!!

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus… Highlights include: ⚡ Escaping from DocumentRoot to System Root ⚡ Bypassing built-in ACL/Auth with just a '?' ⚡ Turning XSS into RCE with legacy code

shubs (@infosec_au) 's Twitter Profile Photo

Just added support for multipart requests to nowafpls. You can grab the latest version from github.com/assetnote/nowa… Short video demo of the multipart request support :)

shubs (@infosec_au) 's Twitter Profile Photo

Super excited to be dropping “Surfacing Security” today, a new podcast from Assetnote. My co-host Michael and I dive deep into Attack Surface Management topics and beyond! Spotify: open.spotify.com/show/3zyCwP4S6… Apple Podcasts: podcasts.apple.com/us/podcast/sur… Youtube: youtube.com/playlist?list=…

shubs (@infosec_au) 's Twitter Profile Photo

For the Sydney bug bounty community: we're holding our second bug bounty meetup at UTS on Sept 6th (Friday) from 7PM to 8PM. RSVP here: h1.community/events/details…

Daniel Grzelak (@dagrz) 's Twitter Profile Photo

In my fwd:cloudsec presentation on Getting into AWS Security Research as a N00bcake, I challenged folks to just go try it and publish the results. It took a little longer than a week but Sid did it, and the results are pretty awesome. plerion.com/blog/your-queu…

Frans Rosén (@fransrosen) 's Twitter Profile Photo

I had so much fun recording this ep. My requirement was for Justin Gardner not to see the slides prior so what you see in the video are his genuine reactions as they happen live, from WTF to FOMO to "why did I not think of this before". Enjoy!

Ian Carroll (@iangcarroll) 's Twitter Profile Photo

In April, Sam Curry and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa

shubs (@infosec_au) 's Twitter Profile Photo

later this month on the 27th of september, Michael Gianarakis and I are going to be demonstrating DNS poisoning related attacks across 30m+ domains at BSides Canberra. we will release a blog post alongside. I promise it doesn’t have any crazy preconditions and it has real impact :)