Lemon (@lemonitup) 's Twitter Profile
Lemon

@lemonitup

Principal Security Engineer @ Red Threat linkedin.com/in/lemonitup/

ID: 2870087877

linkhttp://redthreatsec.com calendar_today10-11-2014 05:05:36

305 Tweet

893 Followers

265 Following

Lemon (@lemonitup) 's Twitter Profile Photo

Happy 1st birthday to Red Threat! Thanks to all of our friends and family that supported us in making this dream a reality.

Happy 1st birthday to Red Threat!

Thanks to all of our friends and family that supported us in making this dream a reality.
Lemon (@lemonitup) 's Twitter Profile Photo

Tired of just grabbing a screenshot after compromising a crestron unit on a pentest? Introducing party mode, a surefire way to spice up your debrief meeting. Finish your presentation. Hit the button and moonwalk out the door. gist.github.com/LemonSec/b62ca…

Tired of just grabbing a screenshot after compromising a crestron unit on a pentest?

Introducing party mode, a surefire way to spice up your debrief meeting. Finish your presentation. Hit the button and moonwalk out the door.

gist.github.com/LemonSec/b62ca…
Lemon (@lemonitup) 's Twitter Profile Photo

Anyone know the SLA time on a P1 for Fortinet I’ve called 4 times this morning and keep getting told they’ll call back later.

Lemon (@lemonitup) 's Twitter Profile Photo

First time I've seen a threat actor leveraging keyemu in the wild. Can't wait to try it on a pentest. Turns out the technique was released years ago in this github repo: github.com/panhavad/undet…

First time I've seen a threat actor leveraging keyemu in the wild. Can't wait to try it on a pentest.

Turns out the technique was released years ago in this github repo: github.com/panhavad/undet…
Lemon (@lemonitup) 's Twitter Profile Photo

I received my first cease and desist for responsibly disclosing a critical vulnerability that gives a remote unauthenticated attacker full access to modify a traffic controller and change stoplights. Does this make me a Security Researcher now?

I received my first cease and desist for responsibly  disclosing a critical vulnerability that gives a remote unauthenticated attacker full access to modify a traffic controller and change stoplights. Does this make me a Security Researcher now?
Rachel Tobac (@racheltobac) 's Twitter Profile Photo

Are you ready to play a game, DEF CON? Our 1st Clue Hunt clue is ready for you. Winners get the challenge coin that screws into the custom badge completing a circuit and lighting it up. Evan Tobac and I can’t wait to meet the winners! The game starts now.

Are you ready to play a game, <a href="/defcon/">DEF CON</a>? Our 1st Clue Hunt clue is ready for you. Winners get the challenge coin that screws into the custom badge completing a circuit and lighting it up. <a href="/evantobac/">Evan Tobac</a> and I can’t wait to meet the winners! The game starts now.
Lemon (@lemonitup) 's Twitter Profile Photo

The worst part about Responsible Disclosure is the “Responsible” part. I want to share my findings now, but I guess I’ll wait until the patch drops! COMPLETELY unrelated, the top song for the day is “It’s getting hot in here”

Lemon (@lemonitup) 's Twitter Profile Photo

Friendly reminder: You can actually buy industrial hardware like crane controllers online and test them for security vulnerabilities. This version allows you to capture and replay button presses.

DistrictCon (@districtcon) 's Twitter Profile Photo

Mark Griffin Interrupt Labs Vigilant Labs bugcrowd alan Ninja3047 trashcanna maxpl0it SSD Labs 1️⃣2️⃣ Intelight X-1 – Grand Central Hack The Planet 🚦🌎 Red Threat successfully demo’d how to bypass the authentication prompt on an Intelight X-1 traffic control system - leading to full access to make any changes you want on the controller.

<a href="/seeinglogic/">Mark Griffin</a> <a href="/InterruptLabs/">Interrupt Labs</a> <a href="/vigilant_labs/">Vigilant Labs</a> <a href="/Bugcrowd/">bugcrowd</a> <a href="/ex0dus_0x/">alan</a> <a href="/Ninja3047_/">Ninja3047</a> <a href="/annatea16/">trashcanna</a> <a href="/maxpl0it/">maxpl0it</a> <a href="/LabsSsd/">SSD Labs</a> 1️⃣2️⃣ Intelight X-1 – Grand Central Hack The Planet 🚦🌎
<a href="/RedThreat/">Red Threat</a> successfully demo’d how to bypass the authentication prompt on an Intelight X-1 traffic control system - leading to full access to make any changes you want on the controller.
DistrictCon (@districtcon) 's Twitter Profile Photo

❗ Most Impactful System ❗ WINNER: Lemon: bypassing authentication prompts on an Intelight X-1 traffic control system 🚦 RUNNER UP: SeongJoon Cho & Dongheyon Oh, SSD Labs: exposing security flaws in the D-Link DSR-250 VPN Router 🌐