Michael Weber (@bouncyhat) 's Twitter Profile
Michael Weber

@bouncyhat

Security Consultant. Not affiliated with Red Hat. I just like the hat. @[email protected]

ID: 1012892729666306048

linkhttps://malware.pizza calendar_today30-06-2018 02:57:00

249 Tweet

1,1K Followers

74 Following

Cristina Cifuentes (@criscifuentes) 's Twitter Profile Photo

This July marks the 30th year anniversary of the publication of my PhD thesis on Reverse Compilation Techniques. In 1994, little did I know the impact this pioneering work would have on the security community that grew up in the 2000s. 🎉 Celebration events to be announced!

Michael Weber (@bouncyhat) 's Twitter Profile Photo

Hey Adnan Khan ... that contributor for the XZ shenanigans that everyone is digging into also was making typo changes in MS repos - github.com/MicrosoftDocs/…. Gee, I wonder what they might have been trying to do with that contributor status from it being approved.

Adnan Khan (@adnanthekhan) 's Twitter Profile Photo

The recent Xz #supplychain attack is very, very interesting. Honestly it’s quite impressive how the threat actor obfuscated their payload. This highlights the risks of downloading release binaries from GitHub directly as the backdoor was only in the release assets.

Michael Weber (@bouncyhat) 's Twitter Profile Photo

Anybody else wish that the underhanded coding competitions were still a thing? After all the XZ shenanigans I'd love to see some underhanded buildscript techniques. Though I still want C and a million other languages too. What kind of prize would be enough to entice folks?

Adnan Khan (@adnanthekhan) 's Twitter Profile Photo

I'm releasing an extremely detailed post on GitHub Actions cache poisoning on Monday. After GitHub's attestation beta launched I did some testing on how cache poisoning can tamper with those too: github.com/AdnaneKhan/Act… github.com/AdnaneKhan/Act… 🧵:

Adam Crosser (@unc1739) 's Twitter Profile Photo

I've just released a blog post on a local privilege escalation vulnerability we identified in Ant Media Server via JMX. It's definitely worth digging into JMX or RMI whenever you run into it as these protocols are generally pretty high risk. praetorian.com/blog/local-pri…

Anthony. (@anthonysecurity) 's Twitter Profile Photo

Proud of the Praetorian Red Team for having two separate tools accepted to BlackHat Arsenal this year. You’re going to want to keep an eye out for the releases. Will link when announced!

Adam Crosser (@unc1739) 's Twitter Profile Photo

We just released a blog post on some GitHub Actions related vulnerabilities we identified in RSPack that would have allowed us to perform a supply chain attack through NPM token compromise. praetorian.com/blog/compromis…

Adnan Khan (@adnanthekhan) 's Twitter Profile Photo

Automated Self-Hosted GitHub Runner takeover has been coming along very nicely. Installs another self-hosted runner an an existing one via fork PR. Will be released during BlackHat / DEF CON conference window.

Automated Self-Hosted GitHub Runner takeover has been coming along very nicely. Installs another self-hosted runner an an existing one via fork PR.

Will be released during BlackHat / DEF CON conference window.
Michael Weber (@bouncyhat) 's Twitter Profile Photo

Yo dawg, I heard you like backdoors so I backdoored your backdoor scanner with a backdoor so I could backdoor anyone using puppet. I think this is like the third mega supply chain attack Adnan has found in like...under 12 months. Definitely hyped for the upcoming talks!

Anthony Weems (@amlweems) 's Twitter Profile Photo

Before joining Google, I submitted some Cloud bugs to the Google Vulnerability Rewards Program (VRP). Today, we announced a dedicated Cloud VRP and I'm so excited to be a part of the program that got me into Google in the first place. Send us vulnz 🙂 cloud.google.com/blog/products/…

Rad (@rad9800) 's Twitter Profile Photo

I've been reversing various browser extension Identity protection products. Push's detection for Evilnginx is rather disappointing - though I do hope I'm missing something given they raised a 15M$ Series A to only come up with this. gist.github.com/rad9800/bb73de…

Anthony. (@anthonysecurity) 's Twitter Profile Photo

github.com/praetorian-inc… Harald is an in-memory tiny high-level CPU, able to process a set of instructions to generate application-layer protocols to be used over a given network protocol (TCP/UDP). Harald will consume a stream of OPCODES and apply different transformations to

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Our owl Mario just published a small VM to generate application-layer protocols. Define your protocol from scratch with opcodes! github.com/praetorian-inc…

Adam Crosser (@unc1739) 's Twitter Profile Photo

While exploring new persistence techniques on Windows, I found that Microsoft’s Text Services Framework (TSF) is a hidden gem for maintaining access on systems with admin rights. Read more: praetorian.com/blog/leveragin…

Adnan Khan (@adnanthekhan) 's Twitter Profile Photo

Make sure y’all are prepared for this. #phishing #Hacking Going to be 🍿 once TAs start using it. github.com/praetorian-inc…