
Joe Rozner
@jrozner
Followers
2K
Following
3K
Media
892
Statuses
17K
Startups, hacking, snowboarding. I build shit in Los Angeles. CEO & Co-Founder Based Security
Los Angeles
Joined August 2008
I think the point I didnāt quite make is that these findings may have interesting attributes and maybe provide new info to people, but they arenāt impressive for a human researcher. The interesting part is, is it faster, cheaper, or easier than paying people. What is the accuracy.
Again, interesting to see details of bugs but still lacking any real clarity of the details (eg. How long it took, what the process was to get here, how much it cost, etc.) while I appreciate these, itās starting to look like the CVE farming people do 1/n.
0
0
0
Again, interesting to see details of bugs but still lacking any real clarity of the details (eg. How long it took, what the process was to get here, how much it cost, etc.) while I appreciate these, itās starting to look like the CVE farming people do 1/n.
When standard SQL injection vectors fail, dig deeper. ā”ļøNew XBOW discovery: Z-Push vulnerability hidden in Basic Authentication username field. Response timing differences revealed PostgreSQL time-based injection where obvious targets were clean. Full analysis:
2
0
3
As someone skeptical, itās interesting to see the write ups coming out of XBOW and get glimpses into what it has actually done. The frustrating part is that itās just that. The after action reports are interesting but itās like looking through a pin hole 1/n.
Even mature products hide critical flaws ā and @XBOW just found another one. CVE-2025-49493: XXE in Akamai CloudTest discovered during our climb to #1 on HackerOne. A complete technical breakdown from an error-based detection to a full exfiltration by @djurado9
2
1
7
XBOW published a blog post talking about their bug bounty results. Interestingly, the numbers look very different than what I was able to scrape and see from the public information on hackerone in May Gonna take another look.
Looking at the last 90 days (which the number 1 position is for) we see 98 reports submitted, 29 of which are valid. That's a 30% acceptance rate. If your SAST/DAST tooling or appsec team had that sort of accuracy, you'd rip it out. 5/n
4
1
10
RT @raelizecom: Our FI training #TAoFI is, in itself, a broad experiment in porting FI attacks across different techniques, from EMFI to Vā¦.
0
5
0