scryh (@scryh_) 's Twitter Profile
scryh

@scryh_

Cloud Vulnerability Research at Google. Opinions are my own.

ID: 999583654098685952

linkhttp://www.devel0pment.de calendar_today24-05-2018 09:31:29

124 Tweet

1,1K Followers

244 Following

pspaul (@pspaul95) 's Twitter Profile Photo

If you're at DEF CON and want to learn how request smuggling can be used on databases, come by track 1 at 2 pm today! If you're not in Vegas, you can watch the live stream at dctv.defcon.org (23:00 CEST)

arxenix (@ankursundara) 's Twitter Profile Photo

Here's my author writeup for htmlsandbox from SekaiCTF blog.ankursundara.com/htmlsandbox-wr… - a parsing differential in streamed vs non-streamed HTML

Sonar Research (@sonar_research) 's Twitter Profile Photo

Critical Roundcube XSS technical details: Desanitization, unsafe Content-Types, CSS exfiltration, and a Service Worker come together to persistently leak emails from a victim's browser. Read about it here: sonarsource.com/blog/governmen… (CVE-2024-42008, CVE-2024-42009, CVE-2024-42010)

Critical Roundcube XSS technical details: Desanitization, unsafe Content-Types, CSS exfiltration, and a Service Worker come together to persistently leak emails from a victim's browser.

Read about it here:
sonarsource.com/blog/governmen…

(CVE-2024-42008, CVE-2024-42009, CVE-2024-42010)
Sonar Research (@sonar_research) 's Twitter Profile Photo

A recording of our TROOPERS Conference talk "From ASCII to UTF-16: Leveraging Encodings to Break Software" is now available! The talk covers basic knowledge of character encodings and explains various vulnerability types and exploitation techniques: youtube.com/watch?v=z-ug2d…

Piotr Bazydło (@chudypb) 's Twitter Profile Photo

As promised, Exchange PowerShell research is getting published in a form of blog posts. Part 1/4 describes two RCEs: MultiValuedProperty internal deserialization + a chain with Command gadget.

Hexacon (@hexacon_fr) 's Twitter Profile Photo

You can find all the talks announced on the agenda: hexacon.fr/conference/age… Again, a big thanks to the review committee for their contribution as well as everyone who took the time to submit a talk. 🙏

Sonar Research (@sonar_research) 's Twitter Profile Photo

Join us at OWASP SF for our talk, "Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail" to discover why client-side sanitization is crucial for a secure web. Can't make it? Stay tuned for our upcoming blog post. #OWASP #GlobalAppSecSanFran

Join us at OWASP SF for our talk, "Sanitize Client-Side: Why Server-Side HTML Sanitization is Doomed to Fail" to discover why client-side sanitization is crucial for a secure web. Can't make it? Stay tuned for our upcoming blog post.

#OWASP #GlobalAppSecSanFran
Sonar Research (@sonar_research) 's Twitter Profile Photo

Having trouble exploiting a file write vulnerability? Don't miss our Hexacon talk to learn more about unconventional attack surfaces that can turn a file write into code execution – even in hardened environments! We'll follow up with a related blog post later. #HEXACON2024

Having trouble exploiting a file write vulnerability?

Don't miss our <a href="/hexacon_fr/">Hexacon</a> talk to learn more about unconventional attack surfaces that can turn a file write into code execution – even in hardened environments!

We'll follow up with a related blog post later.

#HEXACON2024
pspaul (@pspaul95) 's Twitter Profile Photo

JS engine pwning, the old-school way! For this year's Hacklu CTF, I wrote a challenge about exploiting a SpiderMonkey version from 2007. I'm usually not a pwner, but it was very fun to learn about all this stuff. Read the write-up here: blog.pspaul.de/posts/ancient-…

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Recordings of the #HEXACON2024 talks have been uploaded to our YouTube channel 🎬 youtube.com/playlist?list=… See you next year!

James Kettle (@albinowax) 's Twitter Profile Photo

We’re finally live! You can now watch “Listen to the whispers: web timing attacks that actually work” on YouTube: youtube.com/watch?v=zOPjz-…

Sonar Research (@sonar_research) 's Twitter Profile Photo

CORS misconfigurations are definitely not good, but how bad can they get? 🧐 Our latest blog post discusses how an origin reflection issue detected by SonarQube leads to code execution in a real-world application: sonarsource.com/blog/never-und… #appsec #security #vulnerability

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Introducing InternetCTF! 🤯 Earn up to $10,000 for finding RCE vulnerabilities in open-source software AND creating Tsunami plugin patches. Make the internet safer and get rewarded! 🤑 For details on the program, see our latest blog post: bughunters.google.com/blog/675213644…

Sonar Research (@sonar_research) 's Twitter Profile Photo

What a year! We look back and summarize our security research highlights of 2024: 🪲 Vulnerabilities in Jenkins, SourceForge, Joomla, and much more 🎙️ 7 talks, including DEF CON and Hexacon 🏆 5 nominations and 1 award sonarsource.com/blog/vulnerabi… #research #vulnerability #appsec

pspaul (@pspaul95) 's Twitter Profile Photo

This was a fun one to discover! SQL syntax can be ambiguous, and MySQL anticipated this a long time ago. Other SQL dialects stuck to the spec, leading to SQL injection when the right stars align: