pyn3rd Profile Banner
pyn3rd Profile
pyn3rd

@pyn3rd

Followers
13K
Following
4K
Media
208
Statuses
843

Security Researcher&Red Team&Cloud Security. BlackHat&HITB&CanSecWest Speaker.

Leeds, England
Joined February 2016
Don't wanna be here? Send us removal request.
@pyn3rd
pyn3rd
19 days
Over coffee, found a vulnerability.
Tweet media one
0
0
14
@pyn3rd
pyn3rd
1 month
Tweet media one
0
0
13
@grok
Grok
4 days
Join millions who have switched to Grok.
177
361
3K
@pyn3rd
pyn3rd
1 month
RT @wiz_io: 🚨 New research: A cryptomining campaign is hijacking exposed PostgreSQL, hiding payloads in fake 404 pages, and abusing legit i….
0
10
0
@pyn3rd
pyn3rd
1 month
#Bugcrowd Team's handling of my recent report has been absurd. I reported a bug 6 days ago, but they didn’t attempt to reproduce it right away. Today, after it was already fixed, they reproduced it and claimed the bug is no longer applicable, considering it theoretical.@Bugcrowd
Tweet media one
10
1
65
@pyn3rd
pyn3rd
1 month
Old but GOld! That's a good one!.
@h4x0r_dz
H4x0r.DZ
1 month
WAF bypass via junk data [this trick has been around for 13 years] . Do not forget: Hackerone is a scam
Tweet media one
0
0
5
@pyn3rd
pyn3rd
5 months
RT @nirohfeld: We (+@sagitz_ @ronenshh @hillai) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX". The….
0
157
0
@pyn3rd
pyn3rd
6 months
It was a genuine pleasure meeting @infosec_au in Sydney and receiving your insightful advice and valuable information. Thank you! Hope to see you again soon!.
2
0
24
@pyn3rd
pyn3rd
7 months
RT @artsploit: Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RC….
0
84
0
@pyn3rd
pyn3rd
7 months
I truly appreciate @albinowax's kind help in adding both my blog and slides to Web Hacking Techniques 2024.Thank you so much!.
0
1
16
@pyn3rd
pyn3rd
9 months
#CVE-2024-49194 Databricks JDBC Driver via JAAS, Make JDBC Attack Great Again!!. I’ve included the link to my write-up below. Enjoy!!.
Tweet card summary image
blog.pyn3rd.com
Background StoryYesterday, I received a threat intelligence alert regarding the Databricks JDBC driver. After a quick review, I pinpointed the root cause of the issue. The vulnerability stems from imp
4
49
177
@pyn3rd
pyn3rd
9 months
Activiti is a lightweight workflow and Business Process Management (BPM) platform that supports Expression Language expressions within its flows. In this example, I demonstrate how to exploit this feature to trigger RCE in a SpringBoot environment.
2
6
48
@pyn3rd
pyn3rd
9 months
XSS based on DNS CNAME Type Record
Tweet media one
Tweet media two
39
147
1K
@pyn3rd
pyn3rd
10 months
I’m developing a DNS server that responds with random IP addresses and tracks response times. It’s designed to handle a high volume of cache-miss queries for DNS caching, like Local DNS Server.
Tweet media one
0
1
25
@pyn3rd
pyn3rd
10 months
I developed an SSH client rootkit to test EDR detection. When a user logs in, it captures the root password and sends it covertly via a DNS TKEY record. With high daily DNS traffic, EDR systems are unlikely to flag this, as analyzing every query would impact performance.
Tweet media one
8
45
369
@pyn3rd
pyn3rd
10 months
RT @tonghuaroot: Just read "Make JDBC Attacks Brilliant Again", a fantastic 3-year-old research piece that @pyn3rd recently recommended to….
0
4
0
@pyn3rd
pyn3rd
11 months
#CVE-2024-21216 Weblogic Remote Code Execution via T3/IIOP
Tweet media one
5
33
220
@pyn3rd
pyn3rd
1 year
Demonstration attached here.
@pyn3rd
pyn3rd
1 year
#CVE-2024-21733, a Tomcat HTTP Request Smuggling vulnerability, reminds me of the HeartBleed vulnerability, which had a profound impact 10 years ago. In both cases, buffer over-reading is the root cause. Attacker is overwhelmingly likely to skim sensitive data from buffer cache.
0
2
11
@pyn3rd
pyn3rd
1 year
2) Simultaneously, on the right side, I mimicked an attacker triggering an HTTP request smuggling attack to steal sensitive data from the memory cache by exploiting buffer over-reading. This is why, to some extent, I consider that this vulnerability has been underestimated.
0
0
3
@pyn3rd
pyn3rd
1 year
1) I simulated an administrator logging into the web portal normally on the left side, sending an HTTP request with their credentials in the request body.
1
0
2