Michael Stepankin Profile
Michael Stepankin

@artsploit

Followers
7K
Following
1K
Media
24
Statuses
294

Security Researcher at @GHSecurityLab

London, England
Joined July 2014
Don't wanna be here? Send us removal request.
@artsploit
Michael Stepankin
2 months
RT @yarlob: The curious case of exploiting locally running web app.
0
3
0
@artsploit
Michael Stepankin
3 months
RT @watchtowrcyber: The industry is ablaze w speculation around yesterday's publicly disclosed Veeam Software Backup & Replication RCE vuln….
0
56
0
@artsploit
Michael Stepankin
6 months
Here is the blog post:
0
19
59
@artsploit
Michael Stepankin
6 months
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵
Tweet media one
8
83
303
@artsploit
Michael Stepankin
9 months
Hyped to speak at @ekoparty in November!.
@ekoparty
Ekoparty | Hacking everything
9 months
Tweet media one
1
4
25
@artsploit
Michael Stepankin
11 months
Just submitted a CFP to @ekoparty where I want to talk about breaking Maven repository managers. This is the one of the craziest and fruitful research projects I've done in my career.
3
3
43
@artsploit
Michael Stepankin
11 months
RT @tincho_508: So happy to had the chance to present for second time at #BlackHat USA!. I’m already receiving a lot of messages from peopl….
0
59
0
@artsploit
Michael Stepankin
1 year
Kafka UI can be a juicy target for bug hunters, here is why:
1
26
70
@artsploit
Michael Stepankin
1 year
RT @sourceincite: Time to retire some content!. JNDI Injection Remote Code Execution via Path Manipulation in MemoryUserDatabaseFactory: h….
0
46
0
@artsploit
Michael Stepankin
1 year
We take pet’s security seriously!.
@disclosedh1
publiclyDisclosed
1 year
Mars disclosed a bug submitted by @0xdr34m14: #hackerone #bugbounty
Tweet media one
1
0
6
@artsploit
Michael Stepankin
1 year
RT @GHSecurityLab: 🚨 New Blog Alert! 🚨.Can an attacker execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities i….
0
20
0
@artsploit
Michael Stepankin
1 year
RT @cfreal_: The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very sta….
0
59
0
@artsploit
Michael Stepankin
1 year
RT @mmolgtm: In this post I'll use CVE-2023-6241, a vulnerability in the Arm Mali GPU that I reported last November to gain arbitrary kerne….
0
147
0
@artsploit
Michael Stepankin
1 year
RT @infosec_au: The SSRF/auth bypass affecting Ivanti Pulse Connect Secure (CVE-2024-21893), is a great example of what can be achieved wit….
0
88
0
@artsploit
Michael Stepankin
2 years
RT @pwntester: Discover the latest insights from our @GHSecurityLab team’s audit on @home_assistant security! 🛡️.#C….
0
18
0
@artsploit
Michael Stepankin
2 years
RT @mmolgtm: In this post I'll use CVE-2023-4069, a type confusion bug in the Maglev JIT compiler of Chrome that I reported in July, to gai….
0
102
0
@artsploit
Michael Stepankin
2 years
RT @kevin_backhouse: Video of my PoC for CVE-2023-43641: out-of-bounds array access in libcue. libcue is used by tracker-miners, which auto….
0
107
0
@artsploit
Michael Stepankin
2 years
RT @pyn3rd: #CVE-2023-34040 Spring Kafka Deserialization Remote Code Execution
Tweet media one
0
107
0
@artsploit
Michael Stepankin
2 years
Some ideas on how to attack and protect mTLS and certificate authentication in my recent blogpost.
@GHSecurityLab
GitHub Security Lab
2 years
Unravel some hidden vulnerabilities in mTLS systems with @artsploit. As presented at @BlackHatEvents and @defcon this year, the research is now available in our blog.
2
7
28
@artsploit
Michael Stepankin
2 years
RT @GHSecurityLab: If you're at #BHUSA, don't miss @artsploit 's presentation mTLS: When Certificate Authentication is Done Wrong at 2:30pm….
0
7
0