
Ashton
@5ht0n
24. DevSecOps, OffSec, and AppSec. ARG enthusiast. Team 23 CTFs. OSCP, etc
ID: 1070389225634201600
http://cybercrack.net 05-12-2018 18:47:33
279 Tweet
187 Followers
443 Following








Accepted to CyberForce competition, team agreed that if we participate we play to win. Super excited, it’s the most hands-on challenge I’ve seen so far. CyberForce® Program thanks for the opportunity!



So an AMD engineer and 2 Google engineers walk into a bar... and write an article about how "Hello World" in #Python works. The article turns out to be 26 pages. From Python, through C, WinAPI/Kernel, font rendering, to GPU. Enjoy! gynvael.coldwind.pl/?lang=en&id=754 asawicki.info/news_1762_hell…





Most impressive! Ryan Emmons and Stephen Fewer Stephen Fewer of Rapid7 used an Improper Neutralization of Argument Delimiters bug to exploit the Synology DiskStation DS1823xs+ -- and it works or other Synology devices too! They earn $40,000 and 4 Master of Pwn points. #Pwn2Own

Ashton created a lab to reproduce the bug I mentioned on Bug Bounty Reports Explained’s podcast 👏. The same bug I also mentioned on Critical Thinking - Bug Bounty Podcast 😃