Stephen Fewer Profile
Stephen Fewer

@stephenfewer

Followers
9K
Following
968
Media
38
Statuses
816

Senior Principal Security Researcher @rapid7. Decompiler @relyze. Core @metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024.

Ireland
Joined March 2009
Don't wanna be here? Send us removal request.
@stephenfewer
Stephen Fewer
5 days
RT @phrack: Phrack turns 40. The digital drop is live. Download it. Archive it. Pass it on. šŸ’¾ #phrackat40 #phrack72….
0
253
0
@stephenfewer
Stephen Fewer
5 days
RT @chompie1337: I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard….
Tweet card summary image
github.com
Binary Exploitation Phrack CTF Challenge. Contribute to xforcered/PhrackCTF development by creating an account on GitHub.
0
128
0
@grok
Grok
5 days
What do you want to know?.
235
134
1K
@stephenfewer
Stephen Fewer
23 days
RT @todayininfosec: 1998: Cult of the Dead Cow (cDc) debuted the program Back Orifice at DEF CON 6. The controversial remote system adminis….
0
146
0
@stephenfewer
Stephen Fewer
1 month
RT @oct0xor: Check out our analysis of the SharePoint ToolShell vulnerabilities: how the ITW exploit works, how it was patched, and why the….
Tweet card summary image
securelist.com
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
0
30
0
@stephenfewer
Stephen Fewer
1 month
RT @_l0gg: Blog for ToolShell.Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.c….
0
82
0
@stephenfewer
Stephen Fewer
1 month
I just completed the reimplementation of the in-the-wild gadget to use the Msf::Util::DotNetDeserialization routines, so that part is much cleaner now, no more sketchy blobs of base64 šŸ˜….
0
0
12
@stephenfewer
Stephen Fewer
1 month
We now have a (draft) @metasploit exploit module in the pull queue for the recent Microsoft SharePoint Server unauthenticated RCE zero-day (CVE-2025-53770), based on the in-the-wild exploit published a few days ago. Check it out here:
Tweet media one
8
148
506
@stephenfewer
Stephen Fewer
2 months
Our @metasploit auxiliary module for the new Brother auth bypass is available. The module will leak a serial number via HTTP/HTTPS/IPP (CVE-2024-51977), SNMP, or PJL, generate the devices default admin password (CVE-2024-51978) and then validate the creds:
Tweet media one
1
33
101
@stephenfewer
Stephen Fewer
2 months
Today @rapid7 is disclosing 8 new printer vulnerabilities affecting 742 models across 4 vendors. After 13 months of coordinated disclosure with Brother Industries, Ltd, we're detailing all issues including a critical auth bypass. Full details here:
Tweet card summary image
rapid7.com
Multiple Brother Devices: Multiple Vulnerabilities (FIXED) - Rapid7 Blog
2
29
77
@stephenfewer
Stephen Fewer
2 months
Today @rapid7 disclosed two vulns affecting NetScaler Console and NetScaler SDX, found by Senior Security Researcher Calum Hutton! šŸŽ‰ Our blog details the authenticated arbitrary file read vuln (CVE-2025-4365), and the authenticated arbitrary file write vuln (Which the vendor has.
@rapid7
Rapid7
2 months
During root cause analysis for the #NetScaler Console vulnerability, CVE-2024-6235, Rapid7 discovered & disclosed to the vendor 2 additional high severity vulnerabilities. Find exploitation details, remediation advice & more in a new blog:
Tweet media one
1
11
46
@stephenfewer
Stephen Fewer
2 months
RT @ret2systems: What does it take to hack a @Sonos Era 300 for Pwn2Own? . Take a look at our process of adapting existing research, establ….
0
47
0
@stephenfewer
Stephen Fewer
3 months
RT @xaitax: Needed Reflective DLL Injection for Windows on ARM64 for a project, but public examples were nowhere to be found. So, here you….
0
50
0
@stephenfewer
Stephen Fewer
3 months
A new @rapid7 Analysis of CVE-2024-58136 was just published to AttackerKB, courtesy of Calum Hutton šŸ”„ Affecting the Yii framework, this analysis details the root cause and how it can be leveraged for RCE via a dirty file write to a log file:
Tweet card summary image
attackerkb.com
Yii framework is a component-based MVC web application framework, providing developers with the building blocks to create complex web applications including mo…
1
25
65
@stephenfewer
Stephen Fewer
3 months
RT @Neodyme: At #Pwn2Own Ireland 2024, we successfully targeted the SOHO Smashup category. šŸ–Øļø.Starting with a QNAP QHora-322 NAS, we pivote….
Tweet card summary image
neodyme.io
This blogpost starts a series about various exploits at Pwn2Own 2024 Ireland (Cork). This and the upcoming posts will detail our research methodology and journey in exploiting different devices. We...
0
16
0
@stephenfewer
Stephen Fewer
4 months
In another great body of research from @the_emmons, this disclosure chains 3 new vulns in SonicWall's SMA 100 appliances to go from a low privileged account to full RCE as root!! Awesome work as always šŸ”„šŸ”„šŸ”„.
@catc0n
Caitlin Condon
4 months
Great work from @the_emmons on these! And our sincere thanks to SonicWall's PSIRT once again for their exceptionally speedy and helpful response šŸ™Œ
0
9
23