@jon_bottarini Profile picture

Jon Bottarini

@jon_bottarini

Security Stuff @Google - I post about bug bounties, infosec, and everything in between. This is a personal account. Formerly: @Hacker0x01

Similar User
Brett Buerhaus photo

@bbuerhaus

Frans Rosén photo

@fransrosen

Cosmin photo

@inhibitor181

Geekboy photo

@emgeekboy

mohammed eldeeb photo

@malcolmx0x

Yassine Aboukir 🐐 photo

@Yassineaboukir

André Baptista photo

@0xacb

Patrik Fehrenbach photo

@ITSecurityguard

Joel Margolis (teknogeek) photo

@0xteknogeek

Bogdan Tcaciuc photo

@bogdantcaciuc7

Uranium238 photo

@uraniumhacker

Julien | MrTuxracer 🇪🇺 photo

@MrTuxracer

Th3g3nt3lman photo

@Th3G3nt3lman

Gwendal Le Coguic photo

@gwendallecoguic

Akita ZeN 🇦🇷 photo

@akita_zen

Pinned

Just fully disclosed ~30 reports encompassing over two years of hacking on New Relic - hackerone.com/jon_bottarini - most of the reports are PrivEsc/IDOR but there are some business logic bugs in here as well. No recon here! Just getting really familiar with the application itself :)


Jon Bottarini Reposted

Hey this was my bug! Thanks to Doppa for digging in and writing such a detailed post + PoC!

Analyst CVE-2024-8698 on KeyCloak - huydoppa.hashnode.dev/analyst-cve-20…



Jon Bottarini Reposted

Attacking UNIX Systems via CUPS, Part I evilsocket.net/2024/09/26/Att…


Jon Bottarini Reposted

Seems like it's in CUPS. GL;HF github.com/OpenPrinting/c…

Alright yall who's ready for Eternalblue: Linux Edition, dropping October 6?



Jon Bottarini Reposted

New writeup from @_specters_ and I: we're finally allowed to disclose a vulnerability reported to Kia which would've allowed an attacker to remotely control almost all vehicles made after 2013 using only the license plate. Full disclosure: samcurry.net/hacking-kia


Jon Bottarini Reposted

In April, @samwcyo and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa


Absolutely massive $500k bounty just awarded by @coinbase to @CertiKSkyfall - wow!

Tweet Image 1

This... Just creates a WordPress user with the name "admin"... There is no vulnerability here. This could only be an issue if the site is configured to set every new user role as an Administrator but that would be exceedingly rare and it wouldn't matter what your username is.

Alright yall who's ready for Eternalblue: Linux Edition, dropping October 6?



Jon Bottarini Reposted

casual CSS injection on github using the math mode

Tweet Image 1

Excited to share the inaugural blog post from the Android Offensive Security team - Featuring research on exploiting vulns in Android Binder from Gulshan Singh, @vxradius, and @abc_sup -androidoffsec.withgoogle.com/posts/attackin…


Jon Bottarini Reposted

New writeup: "Hacking Millions of Modems (and Investigating Who Hacked My Modem)" samcurry.net/hacking-millio… Thanks for reading! Huge thanks to @blastbots, @bbuerhaus, @infosec_au, @d0nutptr, @iangcarroll, and everyone who reviewed the post beforehand.


Jon Bottarini Reposted

My colleague @hash_kitten and I discovered a full-read SSRF vulnerability in Next.js (CVE-2024-34351). We published our research today on @assetnote's blog: assetnote.io/resources/rese…. Thank you to the Vercel team for a smooth disclosure process.

Tweet Image 1

Jon Bottarini Reposted

Enjoy our next blog post this time an SQL Injection on Apple’s Infra. Another win nets us a $25,000 bounty! 💻💰 #AppleSecurity #Research #bugbountytips #bugbounty blog.projectdiscovery.io/hacking-apple-…

Tweet Image 1

Check out our latest research blog, including detailed overview of how we discovered an SQL injection vulnerability (+ nuclei template) in Masa/Mura CMS and Hacked into Apple's Infrastructure. blog.projectdiscovery.io/hacking-apple-… #AppleSecurity #Research #CyberSecuirty #BugBounty



This is a very clever phishing attempt… read the whole thread!

holy shit i almost got my steam hacked my friend asked me to vote for his friends on some website - they were in second place and just needed 3 more votes but to vote, you had to log in with steam!

Tweet Image 1
Tweet Image 2
Tweet Image 3


Jon Bottarini Reposted

Today we disclosed serious security issues our team discovered in over three million hotel locks that could allow anyone to create master keys. We’ve been working on this for almost two years to ensure it’s fixed responsibly. Thanks to Andy for the great coverage!

Security researchers found flaws in Saflok hotel keycard locks, used on 3 million doors in 13,000 properties worldwide, that can be used to open them in seconds. The lockmaker Dormakaba has been working on a fix but told them only 36% of locks are updated. wired.com/story/saflok-h…



Because of the knowledge I have in programming. Destroyer2009 is using the server's own tools to make its magic happen. he is Using Webhooks, which is a feature that makes it possible to send data in real time between two different systems or applications.

Tweet Image 1


From the @WyzeCam security incident: "As a result of increased demand, <the caching library> mixed up device ID and user ID mapping and connected some data to incorrect accounts." I'm intrigued! Wish there were more technical details around this point. forums.wyze.com/t/update-on-in…


There are people actively impersonating me reaching out to friends / colleagues asking bizarre questions. I have not changed my phone number, if you get a weird message from someone pretending to be me from a new phone number please don't respond or give them any info.

Tweet Image 1

Forging signed commits on GitHub ($10k bug) iter.ca/post/gh-sig-pw… (Credit goes to @_smitop)


Loading...

Something went wrong.


Something went wrong.