Chris Evans Profile Banner
Chris Evans Profile
Chris Evans

@scarybeasts

Followers
26,112
Following
205
Media
45
Statuses
3,541

CISO and Chief Hacking Officer at HackerOne. Past: Founded {vsftpd, Chrome security, Google Project Zero}; Tesla; Dropbox. Hacker / Researcher. beebjit.

San Francisco Bay Area
Joined May 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@scarybeasts
Chris Evans
3 years
I'm now CISO and Chief Hacking Officer at HackerOne. "The most rewarding parts of my career have been the times when I’ve hired hackers, rewarded independent hackers, defended hackers, and celebrated the achievements of hackers."
Tweet media one
61
52
693
@scarybeasts
Chris Evans
6 years
Overheard today: "the least plausible technology in Star Trek is instant video conferencing that just works".
10
558
2K
@scarybeasts
Chris Evans
7 years
So my CPU has a webserver in it and my SYSTEM account has a JavaScript engine in it. I think we've lost the complexity battle.
31
806
1K
@scarybeasts
Chris Evans
9 years
I'm very excited to soon be joining @TeslaMotors to lead security.
87
177
523
@scarybeasts
Chris Evans
7 years
Uhhhuh this Google Project Zero bug has a working remote exploit into the WiFi chip of the iPhone 7!
14
455
513
@scarybeasts
Chris Evans
8 years
Hardest exploit I ever wrote: [0day][exploit] Advancing exploitation: scriptless 0day exploit against Linux desktops
17
407
497
@scarybeasts
Chris Evans
5 years
Remember, Google Chrome is very well sandboxed. So when you see a Chrome 0-day fixed by the team in isolation, you have to suspect another company (Microsoft?) is sitting on an unfixed sandbox escape. Usually (but not always) a Windows kernel bug. Often Win 7 only.
5
105
475
@scarybeasts
Chris Evans
6 years
Red alert? "tl;dr: there is presently an embargoed security bug impacting apparently all contemporary CPU architectures that implement virtual memory, requiring hardware changes to fully resolve.":
9
336
450
@scarybeasts
Chris Evans
3 years
[blog] Recovering "lost" treasure-filled floppy discs with an oscilloscope: , a project with Phil Pemberton. A fun project with a lot of nuance and experimentation.
Tweet media one
Tweet media two
Tweet media three
9
111
417
@scarybeasts
Chris Evans
7 years
[blog] [1day] Ode to the use-after-free: one vulnerable function, a thousand possibilities:
Tweet media one
5
232
378
@scarybeasts
Chris Evans
4 years
[blog] "Reverse engineering a forgotten 1970s Intel dual core beast: 8271, a new ISA": A small team decapped / reversed an 8271; beautiful but shockingly large. Dual core! Larger than the 6502 CPU (right). Fascinating Intel history and a new Intel ISA!
Tweet media one
7
116
346
@scarybeasts
Chris Evans
7 years
[blog] Employed again! I’m now Head of Security at Dropbox, and enjoying it. Details:
33
30
342
@scarybeasts
Chris Evans
2 years
On behalf of the HackerOne team, I’d like to apologize to the Ukrainian hacker community for the frustration and confusion that our poor communication has caused. We have not (and will not) block lawful payments to Ukraine.
9
56
307
@scarybeasts
Chris Evans
7 years
Just got a $14,000 bounty for an 18 byte file. $778 per byte. Not bad :) I'll celebrate that file's density by sending it along to charity.
9
51
296
@scarybeasts
Chris Evans
4 years
I'm restoring a 35 year old floppy drive. In case you were wondering what the magnetic signal on a floppy disc looks like, wonder no further. This is a clean, strong (DFM encoded) signal from a 35 (!!) year old disc.
Tweet media one
9
48
271
@scarybeasts
Chris Evans
6 years
OMG. Does Intel have broken speculative execution? "AMD ... does not allow memory references, including speculative references, that access higher privileged data when running in a lesser privileged mode when that access would result in a page fault."
9
158
242
@scarybeasts
Chris Evans
3 years
[blog] The cleverest floppy disc protection ever? Western Security Ltd. , this one really impressed me.
Tweet media one
Tweet media two
5
71
243
@scarybeasts
Chris Evans
5 years
Your other Halloween scare, looks like a Chrome 0-day: "CVE-2019-13720: Use-after-free in audio. Reported by Anton Ivanov and Alexey Kulaev at Kaspersky Labs on 2019-10-29 Google is aware of reports that an exploit for CVE-2019-13720 exists in the wild."
3
81
235
@scarybeasts
Chris Evans
7 years
[blog] *bleed continues: 18 byte file, $14k bounty, for leaking private Yahoo! Mail images
Tweet media one
Tweet media two
Tweet media three
6
144
235
@scarybeasts
Chris Evans
7 years
iPhone 7 full exploit. Wow, we don't have details yet, but @laginimaineb hops from WiFi chip to full host AP control:
4
159
225
@scarybeasts
Chris Evans
6 years
Ok I'm in awe of @tehjh . Not 100% sure I've got it but did he speculatively execute (x64) a speculative program (BPF) by colliding the branch target buffer in order to leak via a cache side effect? Words cannot describe skullduggery of this magnitude.
1
38
213
@scarybeasts
Chris Evans
4 years
Well that sucks. Sometimes, 35 year old floppies have failed glue so the magnetic particles fly off when you try and read them. Pretty picture to tell a thousand words:
Tweet media one
13
44
196
@scarybeasts
Chris Evans
8 years
[0day] [exploit] Compromising a Linux desktop using... 6502 processor opcodes on the NES?!:
8
190
197
@scarybeasts
Chris Evans
7 years
"We can't repel firepower of that magnitude" said the strong iPhones as they fell to a full remote over-the-air WiFi compromise by @laginimaineb . Best research I've seen this year:
2
95
189
@scarybeasts
Chris Evans
2 years
HackerOne supports its customers. We’re in close contact with Uber’s security team, have locked their data down, and will continue to assist with their investigation.
@Uber_Comms
Uber Comms
2 years
We are currently responding to a cybersecurity incident. We are in touch with law enforcement and will post additional updates here as they become available.
4
1K
4K
4
21
186
@scarybeasts
Chris Evans
4 years
There's something hauntingly beautiful watching all these iPhones die at slightly different times, as they get a WiFi broadcast packet of death. (from )
3
58
181
@scarybeasts
Chris Evans
6 years
Very nice little blog post if you want to get in to exactly what a modern Intel CPU can execute in parallel and why:
0
81
183
@scarybeasts
Chris Evans
3 years
This is excellent by Apple. A ~6 year old phone still getting patches. It's great for security and great for those of us who see an upgrade as wasteful if the old device is functional. Still annoyed about loss of patches for my Pixel 2 after ~3 years.
@Mr_Stark_
Mr. Stark
3 years
*Apple announces that iPhone 6s is also compatible for iOS15 update* iPhone 6 users right now : #WWDC21
Tweet media one
0
395
1K
5
37
186
@scarybeasts
Chris Evans
3 years
I don't tweet a lot.... but when I do, it's a "must read" by @fugueish , "Prioritizing Memory Safety Migrations": , can't decide if the best bit is "mean-spirited packets" or "attacker is able to get at C/C++ attack surface, we must assume they can win."
3
49
184
@scarybeasts
Chris Evans
6 years
As a technical community we've had to work _really_ hard to increase input latency despite continuing exponential improvement in computing power. No one would have thought it possible, but we've sucked so hard we did it. BTW, complexity also kills security. :(
@danluu
Dan Luu
6 years
Computer latency: 1977-2017
Tweet media one
107
2K
3K
5
85
183
@scarybeasts
Chris Evans
7 years
[blog] Proving missing ASLR on and over the web for a $343 bounty :D
Tweet media one
3
133
174
@scarybeasts
Chris Evans
5 years
If you're in Enterprise / Corporate security, I recommend reading and implementing this fresh take from Dropbox on 3rd party vendor security: TL;DR vendor questionnaires are a shit show and here's a better way. [forgot to amplify this when first posted]
2
52
166
@scarybeasts
Chris Evans
5 years
Let me be clear: Chrome has consistently been a more secure browser than Safari for too many reasons to list in a tweet. Disgraceful from Apple, particularly answer #4 :
6
37
162
@scarybeasts
Chris Evans
6 years
Back in the UK for the first time in 8 years. Me: what's new? Cabbie (very serious): well, there's the Brexit thing but the big one was KFC running out of chicken.
3
12
163
@scarybeasts
Chris Evans
7 years
[blog] Black box discovery of memory corruption RCE on :
1
110
159
@scarybeasts
Chris Evans
6 years
@__apf__ @googlechrome To be honest, I was really hoping for a summary of the best conspiracy theories.
2
0
159
@scarybeasts
Chris Evans
5 years
Best bug bounty report ever? "With great pleasure we would like to report that we have discovered a GraqhQL endpoint that discloses internal beer consumption at your offices."
2
55
160
@scarybeasts
Chris Evans
4 years
iOS security can be summarized as two extremes. On one hand, Apple have invested significantly in security mitigations and many security layers. On the other hand, code quality is poor. Which factor dominates? Poor code quality. Attacker just cranks through the layers.
@i41nbeer
Ian Beer
4 years
But having such a large and privileged attack surface reachable by anyone means the security of that code is paramount, and unfortunately the quality of the AWDL code was at times fairly poor and seemingly untested.
3
12
147
4
23
156
@scarybeasts
Chris Evans
6 years
[blog] Dropbox: Protecting Security Researchers. More to do but I think this is a strong start. Please join us:
6
69
150
@scarybeasts
Chris Evans
7 years
Am I the only one who's a fan of branded vulnerabilities? KRACK, ok got it, conversation started. CVE-2017-blablahonkhonk -- remind me, which one is that?
14
36
146
@scarybeasts
Chris Evans
7 years
[blog] Are we doing memory corruption mitigations wrong?
4
98
137
@scarybeasts
Chris Evans
5 months
Hackers, HackerOne's Bug Bounty Program just cleared the $1,000,000 rewards milestone! Thanks so much for helping secure the platform. The creativity in your reports is spectacular, representing novel, elusive (and sometimes severe!) findings that no other security tool can find.
Tweet media one
Tweet media two
2
14
138
@scarybeasts
Chris Evans
6 years
In maths, they have the Erdos number. In Infosec, I think we now have the Horn number. This is the number of times you have to read Spectre variant #2 before you get it.
3
30
134
@scarybeasts
Chris Evans
7 years
We tsk-tsked at Windows for putting font parsing in ring 0, but Linux is determined to try and catch up.
@tgraf__
Thomas Graf 🐝
7 years
Linux 4.13 is out with in-kernel TLS support Graph: 99th centile latency - kTLS(green), OpenSSL (blue) Source:
Tweet media one
12
353
419
10
92
132
@scarybeasts
Chris Evans
4 years
[blog] Turning a £400 BBC Micro (1981) into a $40,000 disc writer (1987) I enjoyed doing this one 😃
13
31
129
@scarybeasts
Chris Evans
6 years
I don't think site isolation is a "mitigation" for Spectre. I think failure to align web security boundaries (sites) with OS security boundary primitives (processes) is a browser design error that only Chromium has an answer for (thanks to years of investment). /cc: @nasko
7
42
123
@scarybeasts
Chris Evans
9 years
Project Zero blog: beautiful ESET AV exploit by @taviso -- "unpacker" opcodes execute on virtual then _real_ CPU! http://t.co/bkpF3dYi8S
1
171
119
@scarybeasts
Chris Evans
3 years
OMG! The Google Chrome team is avenging Google Reader!
@__apf__
Adriana Porter Felt
3 years
Starting today, we're experimenting on Chrome stable with a Following feature. You can choose websites to follow, and their RSS updates will appear on Chrome's new tab page. We've been working on this for a while & I'm super excited to hear what people think 👇
Tweet media one
Tweet media two
98
248
1K
7
34
114
@scarybeasts
Chris Evans
7 years
Most fun exploit I ever wrote: [0day] [exploit] Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes?!
4
93
113
@scarybeasts
Chris Evans
3 years
Interesting new attacks against TLS, targeting the underlying protocols: A quick, practical tip: don't re-use the same hostname for different TLS-protected protocols, and don't use a wildcard cert covering different hostnames with different protocols.
3
43
114
@scarybeasts
Chris Evans
7 years
So while everyone was whining about disclosure on Twitter, Microsoft shut up and engineered a very fast fix. That's how it's done. Nice.
1
24
110
@scarybeasts
Chris Evans
7 years
[blog] *bleed, more powerful: dumping Yahoo! authentication secrets with an out-of-bounds read
Tweet media one
1
58
109
@scarybeasts
Chris Evans
6 years
[blog] Dropbox: MacOS monitoring the open source way:
5
53
101
@scarybeasts
Chris Evans
3 years
Google is often much stronger than Apple at security.... but this is one area where Apple spanks Google. I have a Pixel 2 and it's still a very fast and capable phone. This is disappointing not just for the security, but also for the waste.
7
18
106
@scarybeasts
Chris Evans
8 months
Hackers, an important one. e.g.: we heard that CVSS "PR" is handled inconsistently (should be PR:None for self-sign-up). We're transparently listing a set of Detailed Platform Standards for consistency across programs. Need your help -- what to cover next?
10
28
105
@scarybeasts
Chris Evans
6 years
Ok. Read this, an article I loved earlier this year, "reading kernel memory from user mode", via "Abusing speculative execution". It was a negative result. Did someone flip it positive?
1
50
103
@scarybeasts
Chris Evans
9 years
Project Zero blog: interesting high entropy ASLR bypass via MemoryProtector & Mitigation Bypass win by Ivan Fratric: http://t.co/fR7ZuGXxaT
5
117
99
@scarybeasts
Chris Evans
6 years
Dropbox is hiring for security, all roles. This includes hiring in Seattle! We're hosting an evening of talks, snacks and drinks at the (awesome!) Dropbox Seattle office on Feb 15th. RSVP:
5
92
97
@scarybeasts
Chris Evans
9 months
A huge thank you to @HarshDRanjan1 for patience relating to report . Severity went Medium -> High; bounty raised. Good programs will re-evaluate reports with rational arguments. Hackers, thanks for the CVSS "Privileges Required" feedback. Action underway.
10
6
96
@scarybeasts
Chris Evans
6 years
Dropbox will be publishing a lot more about security initiatives and technology in 2018. Some interesting posts in the works; for now here's a high-level opener:
3
25
94
@scarybeasts
Chris Evans
7 years
Interesting Google Project Zero bug from @tehjh in the Linux core memory subsystem (mincore()):
0
51
92
@scarybeasts
Chris Evans
9 years
Project Zero blog: the best type confusion exploit I've seen! 100%[*] reliable. By @natashenka : http://t.co/NyxiWOBPyW
0
91
89
@scarybeasts
Chris Evans
9 months
Hackers, we're listening to feedback around the platform retesting feature. As a step to improvement, customers can now tag more than $50 when approving a retest. To respect your time, $50 remains a strict minimum.
Tweet media one
4
5
89
@scarybeasts
Chris Evans
7 years
[blog] Further hardening glibc malloc() against single byte overflows
2
60
88
@scarybeasts
Chris Evans
7 years
[blog] Introducing Qualys Project Zero?
4
53
85
@scarybeasts
Chris Evans
9 years
Project Zero blog: full story on the recent ntpd bugs. Interesting exploitation tricks! For a remote vector on OS X: http://t.co/KcpcKhuW10
1
101
84
@scarybeasts
Chris Evans
9 years
Project Zero blog: a fascinating exploit for the Linux Nvidia driver from Lee Campbell, with two race conditions: http://t.co/qXyRsl8TCo
2
127
83
@scarybeasts
Chris Evans
5 years
Great post by the V8 team on their Spectre journey: Some thought provokers, "offensive research advanced much faster than our defensive research" and particularly "engineering effort diverted to combating Spectre was disproportionate to its threat level"
0
37
82
@scarybeasts
Chris Evans
6 years
. @anders_fogh Thoughts on vs. vs. ?
1
41
80
@scarybeasts
Chris Evans
2 years
This is magnificent. What's your aging hacker handle? Should I change mine to become "beasts of mild concern"?
@JasonGeffner
Jason Geffner
2 years
Now that I'm approaching 40, I need to change my hacker alias to something age-appropriate, like ACiD ReFLuX.
55
98
1K
12
7
81
@scarybeasts
Chris Evans
9 years
My last day at @google and a Project Zero post for you on bypassing and improving a Flash mitigation, enjoy, adios! http://t.co/p1QVgLsEog
6
67
81
@scarybeasts
Chris Evans
10 years
Project Zero's first technical blog post! If you're very technical and into low level exploitation, it's a must-read: http://t.co/RJsw476CGM
4
90
80
@scarybeasts
Chris Evans
4 years
[blog] Weak bits floppy disc protection: an alternate origins story on 8-bit: I found an unusually sophisticated 1980s protection and the author had a great story how it came about.
Tweet media one
9
26
77
@scarybeasts
Chris Evans
4 years
The 4th law of thermodynamics: all video conferencing software will expand its energy requirements to precisely match 100% utilization of the host machine, no matter how powerful.
3
12
76
@scarybeasts
Chris Evans
7 years
Qualys Project Zero strikes again, this time with excellent research into heap<->stack collisions including 64-bit!
1
57
76
@scarybeasts
Chris Evans
8 months
Hackers, we changed the expiration time on private program invites from 7 days to 14. Thanks for the feedback and suggestion!
9
4
77
@scarybeasts
Chris Evans
7 years
It must be an easy life to have the job title "Offensive Security Engineer". Roll into the office late, flip off a few developers who introduced XSS, and then your work is done for the day?
5
7
75
@scarybeasts
Chris Evans
6 years
[blog] Dropbox support for WebAuthentication launched. Immediate love for U2F keys in Firefox and excited for upcoming Edge support!
3
29
74
@scarybeasts
Chris Evans
8 years
[1day] [PoC with $rip] Deterministic Linux heap grooming with huge allocations:
0
54
73
@scarybeasts
Chris Evans
7 years
What horror is this?? In 1951, one type of computer main memory was a huge tube of mercury with bits encoded in sound waves inside it:
11
23
71
@scarybeasts
Chris Evans
7 years
Huge mobile result by Gal @P0 : "full device takeover by Wi-Fi proximity alone, requiring no user interaction":
2
64
72
@scarybeasts
Chris Evans
6 years
British English is best English. "At one point, Forcefully Unmap Complete Kernel With Interrupt Trampolines, aka FUCKWIT, was mulled by the Linux kernel team, giving you an idea of how annoying this has been for the developers."
3
29
71
@scarybeasts
Chris Evans
4 years
. @doctorow See . In my experience, the most common form of anti-disclosure bullying is abusing business relationships. i.e. some SVP or CEO calls up some SVP or CEO (of the company where the researcher works), rants and makes threats, etc.
3
25
70
@scarybeasts
Chris Evans
9 years
Project Zero blog: ROWHAMMER EXPLOITED! Twice, in fact. http://t.co/Yph9PYwS4o -- needs broad dissemination / discussion.
6
151
71
@scarybeasts
Chris Evans
9 years
Project Zero Blog: "Taming the wild copy", a new way to exploit memcpy(..., ..., -1): http://t.co/sAjFizageL
3
91
71
@scarybeasts
Chris Evans
3 months
Hackers, important! Share if you can. We request more data on programs. Got a valid report? The "Give feedback" button is active. Rant if necessary, but please take time for the great programs too. We will help programs improve, and highlight programs that respect norms and you.
Tweet media one
12
8
72
@scarybeasts
Chris Evans
6 years
Thanks LinkedIn. I must decline to press the "unlock insights" button based on these samples. "Chris, over 20,000 people in San Francisco Bay Area share your first name" "Thinking about a raise? $60,000 is the median salary for the title Chief Of Security in United States."
2
2
71
@scarybeasts
Chris Evans
8 years
Google Project Zero is really kicking ass. Read a full Android privesc exploit from new team member @laginimaineb :
1
36
68
@scarybeasts
Chris Evans
28 days
Hackers, I think this one's important. You deserve transparency as a matter of fairness and platform integrity. It is now mandatory for programs to always show time-to-bounty related statistics. (Example is from a leading program.)
Tweet media one
7
3
69
@scarybeasts
Chris Evans
7 years
If North Korea nails our power grid, it'll be because we were all busy waging the disclosure holy wars (episode: 17) on Twitter.
2
9
68
@scarybeasts
Chris Evans
9 years
Project Zero blog: part 1 of 4 on 100% reliable exploitation. Many interesting bugs referenced. http://t.co/FQk7ddyqMm (part 2 gets real)
3
65
67
@scarybeasts
Chris Evans
10 years
Project Zero blog: _tons_ of details on the recent iOS / OS X sandbox escapes / kernel bugs: http://t.co/hBS9AQXgah -- enjoy!
3
77
66
@scarybeasts
Chris Evans
4 years
[blog] [release] Clocking a 6502 to 15GHz (!):
2
24
64
@scarybeasts
Chris Evans
1 month
Every Bug Bounty Program has areas for improvement. IMHO, the mark of a Gold Standard BBP is accepting feedback with humility and making updates. In this instance, we had a bounty table inconsistency. I approved $60,000 in retroactive payouts and we straightened out the table.
@pxmme1337
Pomme
1 month
HackerOne just gave me $5,000 out of the blue on a report I had forgotten Today is a good day
Tweet media one
6
1
224
3
4
64
@scarybeasts
Chris Evans
8 years
[0day] [PoC] Risky design decisions in Google Chrome and Fedora desktop enable drive-by downloads:
2
73
61
@scarybeasts
Chris Evans
7 years
Nice article on Google Project Zero: ( @taviso , hands off @headhntr 's sunnies!)
0
27
59