@stargravy Profile picture

evan

@stargravy

tryin to hack stuff

Joined July 2015
Similar User
Danny Jones Podcast photo

@KONCRETE

mandatory.bsky.social photo

@IAmMandatory

Thach Nguyen Hoang 🇻🇳 photo

@hi_im_d4rkn3ss

Janggggg photo

@testanull

Dinh Hoang photo

@hir0ot

Petrus Viet photo

@VietPetrus

Jacob Baines photo

@Junior_Baines

Phan Thanh Duy 🇻🇳 photo

@PTDuy

Antonios Tsepouras photo

@tony_tsep

Aurora Temporalis photo

@kpeori

Jill Parsons photo

@JillPar32808675

Dennis Loreto photo

@dloreto007

staying at least a little busy during time off / self (un?) employment.

Tweet Image 1

Congratulations to all the researchers recognized in this quarter’s MSRC 2024 Q3 Security Researcher Leaderboard! 🎉Thanks to all the researchers who partnered with us for your hard work and continued dedication to securing our customers. Learn more in our blog post:…

Tweet Image 1


evan Reposted

Nice! Tenable Researcher used their second attempt to compromise the Lorex 2K Indoor Wi-Fi in the most subtle of way. They head off to the disclosure room with the details. #Pwn2Own #P2OIreland


evan Reposted

Our latest post detailing compromising the #PaloAlto #Expedition. While investigating CVE-2024-5910, we discovered and reported 3 additional vulnerabilities allowing an attacker to obtain RCE and leak integration credentials across the ecosystem. horizon3.ai/attack-researc…


evan Reposted

At @assetnote, we identified DNS poisoning on an estimated 30M+ domains. We noticed this in 2021, but suspect that it's been happening for a lot longer. We detail the analysis, theories and two practical and reliable client-side exploitation vectors. dnspoison.com


evan Reposted

💀Here is my unauthenticated whatsup gold SQL injection to authentication bypass exploit P.S: my Friday starts now github.com/sinsinology/CV…

Tweet Image 1

evan Reposted

Fortra FileCatalyst Workflow CVE-2024-6633: dbPassword="GOSENSGO613"

PORT STATE SERVICE VERSION 4406/tcp open jdbc HSQLDB JDBC (Network Compatibility Version 2.3.4.0)



feels important to mention that the first thing that came to mind when drafting this was a mockup of this image, and the “SSRFing” pun for the title. Understand why it didn’t get used, but feel the need to share the vision.

Tweet Image 1

This was the last thing I found / worked on while still at Tenable. A fun SSRF via Microsoft Copilot Studio leading to a critical info disclosure (CVE-2024-38206). Thanks to @DinoBytes and the team for helping get this one out. tenable.com/blog/ssrfing-t…



This was the last thing I found / worked on while still at Tenable. A fun SSRF via Microsoft Copilot Studio leading to a critical info disclosure (CVE-2024-38206). Thanks to @DinoBytes and the team for helping get this one out. tenable.com/blog/ssrfing-t…


evan Reposted

over the last half a year, @rhinozzcode and i have worked on an investigation into Tracki, a "world leader in GPS tracking", and ExploreTalent, one of the biggest talent listing services in the world. what the hell do those two have in common? (feature art by @fourleafisland)

Tweet Image 1

evan Reposted

.@SinSinology dropped some great tips for anyone struggling to stay motivated and wanted to share them with y'all. Here they are: 1. Get the reps in, you can’t avoid this part (continued in thread).

Tweet Image 1

evan Reposted

Another product, another deserialization vulnerability, another RCE from @mwulftange: Patch your Telerik Report Server (CVE-2024-6327 & CVE-2024-6096) code-white.com/public-vulnera…


evan Reposted

Meet ConfusedFunction 😕 - A privilege escalation vulnerability I recently discovered in GCP: tenable.com/blog/confusedf…


evan Reposted

Progress just un-embargoed a very closely guarded auth bypass in MOVEit Transfer's SFTP mechanism - CVE-2024-5806. We were lucky enough to receive a tip-off :-) Enjoy our analysis, we had a lot of fun. labs.watchtowr.com/auth-bypass-in…


evan Reposted

🚨🚨🚨PoC DROP! Full Details 🔥 of the Veeam Enterprise Manager Authentication Bypass🩸CVE-2024-29849 is out now! 🪲 summoning.team/blog/veeam-ent…


evan Reposted

Grandstream, a leading manufacturer of IP voice and video communication equipment, has had significant vulnerabilities in their cloud identified and reported by Atropos. These flaws could compromise the VoIP infrastructure of thousands of companies. atropos.ai/third-times-a-…


evan Reposted

Our deep-dive, IOCs, and exploit for CVE-2023-34992, an unauth command injection as root, effecting #Fortinet #FortiSIEM appliances. horizon3.ai/attack-researc…


evan Reposted

#TenableResearch has discovered a critical memory corruption vulnerability dubbed Linguistic Lumberjack in #FluentBit, a core component in the monitoring infrastructure of many cloud services. ⚠️ CVE-2024-4323 spr.ly/6017dmkbd


evan Reposted

Speaker Feature: Evan Grant & Jimi Sebree (@dinobytes / @stargravy) - "Consumer Routers Still Suck" Come see Jimi / Evan at RVAsec 13! buff.ly/3Uh2Fq4

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.