@reginaldojsf Profile picture

Reginaldo Silva

@reginaldojsf

Security @ Mysten Labs. Opinions are mine and do not necessarily reflect my employer’s.

Joined June 2009
Similar User
Alvaro Muñoz photo

@pwntester

Ben Hayak photo

@BenHayak

Ashar Javed photo

@soaj1664ashar

Roman Shafigullin photo

@shafigullin

Francisco Correa photo

@panchocosil

xorb photo

@evil_xorb

yappare photo

@yappare

Enguerran photo

@opnsec

Jasminder Pal Singh photo

@Singh_Jasminder

Stefano Di Paola photo

@WisecWisec

Simone Memoli photo

@Simon90_Italy

@v!b$123! photo

@vibs123i

Omer Gil photo

@omer_gil

Cássio Gomes photo

@netfuzzer

Sui had an outage. The team fixed it quickly. Here's the post mortem.

Last night's outage resolution: blog.sui.io/sui-mainnet-ou… Very strong response by the team! The night is dark and full of terrors but we got @aschran and @technicaldebtor 💪.



"The year of Linux on the desktop" #crowdstrike #iwannabelieve


I joined Mysten Labs ~2 months ago and have been learning a lot and having fun. Now, my team is hiring. If you love appsec, static analysis, and/or nerding out about high-impact, low-sloc programs (a.k.a smart contracts), let's work together!! Apply at: jobs.ashbyhq.com/mystenlabs/3e9…


Reposting for the benefit of my bug-bounty and CTF friends. If you haven't played with Sui yet, you're missing out.

Our Capture the Flag security challenge at #SuiBasecamp starts tomorrow, April 9! Get your team together to secure flags and win prizes. Onchain and open to all – get started at basecamp.osec.io



Reginaldo Silva Reposted

Dear bug bounty platforms and programs, Please work together in 24' to figure out a way to allow bug hunters to perform source assisted assessments. We hate making millions of requests and reading js until our eyes bleed when it would have taken 30 minutes with source. Thanks!


I love getting paid to hack billion dollar companies. Yet, one of the nicest feelings is when I run apt upgrade and it fixes a bug I reported. This time it was CVE-2023-6185 and CVE-2023-6186, which were the subject of my @h2hconference talk.


We’ve known about CVE-2023-51385 since 2016 or so. In fact, it was one of the first rules we added to Meta’s Zoncolan and @FrancescoLogozz used it as an example in talks. At the time, we all thought that it was an OpenSSH feature from how the code was written. Yay progress!


Dear folks running bounty programs, I have a holiday request: If I send you a full read XXE, consider it as RCE. That has been true for me, always, since 2012. I don't want to mess with your prod environment to change the CVSS from 9.6 to 9.8 or 10 but if, you ask, I will. Thanks


Reginaldo Silva Reposted

Did you know there is a legal fund that helps protect fellow bug hunters from legal threats? If you instruct us to donate your reward to the Security Research Legal Defense Fund, Google will quadruple it!


Went to report a vulnerability to a Fortune 500 company to their own form. Blocked by the WAF because it thought my message looks suspicious. Of course. It has a payload. That's the whole point of that form, isn't it?


The slides, demo videos, and stuff for my @h2hconference talk are at ubercomp.com/h2hc/2023/


The coolest bug I submitted to Facebook was not the openid RCE, but one that affected Parse. Back then, it was easy to have type confusion bugs in v8. So you could bind an image to buffer functions, and it gave a read/write gadget on a random memory area. Node.js was affected too

Tweet Image 1

#bugbounty woes / a poem Critical issue Reported on the 11th / a saturday Fixed on the 13th / right away If they knew about it, they never said Yet they closed it on the 30th a duplicate.


My best #bugbounty investment to date in terms of ROI is to have a machine powerful enough to run some big data queries locally. AWS Athena is great, but breaks my flow and gets expensive quickly.

Tweet Image 1

And I was born on Halloween :) That should explain all the spell casting.

🎃🕷️ Our spooktacular DOD Vulnerability Disclosure Program Researcher of the Month is none other than @reginaldojsf! They've exorcised a wicked remote code execution bug from the Royal Elementor Addons plugin. We're bewitched by their skills! 🌟👻 #ResearcheroftheMonth

Tweet Image 1


TIL that if you accidentally click the @shodanhq cancel subscription button, not only does it cancel your subscription without confirmation, it eats your credits too. On the 5th. Shodan has been flaky but I still want to subscribe.


TFW you know for a fact you have RCE on thousands of machines and you've never made a single request to them. Thanks to shodan and (since shodan has been flaky) fofa.


Loading...

Something went wrong.


Something went wrong.