strawp Profile Banner
@strawp@infosec.exchange Profile
Followers
818
Following
4K
Media
576
Statuses
13K

Principal security consultant @nettitude_labs. CHECK Team Leader (Applications). Frequently uninjured snowboarder. @[email protected]

document.location
Joined April 2008
Don't wanna be here? Send us removal request.
If you miss Twitter back in pre-2010 days when it was just full of geeks sharing cool stuff, then get on Mastodon. is where I'll be now. 👋.
0
0
1
YES! You found one! I pretty much laughed all the way through that😂.
0
0
0
I did a thing.
@LRQA_Cyber_Labs
LRQA Cyber Labs
3 years
Popular document storage solution, ONLYOFFICE, affected by multiple vulnerabilities. Our latest post by @strawp shows how to exploit this for unauthenticated remote code execution.
3
0
8
Oh Jesus 🤦‍♂️.
@ryxcommar
Senior PowerPoint Engineer
3 years
congrats to every Twitter employee who commits their entire venv/ for avoiding the layoffs. Elon needs allstars like you who can push 200k lines of code in a single merge.
Tweet media one
0
0
0
I used to do this as a software developer, but now I actually am a hacker I take it more seriously and have playlists and shit.
@fesshole
Fesshole🧻
3 years
I work from home as software developer. When I'm bored I turn of the lights and play techno music to pretend I'm in a hacker movie.
1
0
1
Oh yay, haven't had a fun OpenSSL vuln since heartbleed 🍿.
0
0
0
A masterclass of OSINT. It's wild that:. 1. RU military communicate by normal phone calls (I guess TEAMS would be a no-no 😁). 2. In RU you can just buy call records on the black market.
0
1
2
This sort of methodology is very useful. Find something that talks HTTP, find the API endpoints, exploit.
@hacker_
Corben Leo
3 years
I hacked a gaming company this year. Here's how I did it:.
0
0
1
How are there any Exchange servers left standing at this point?.
@strandjs
strandjs - [email protected]
3 years
Please stop running on prem exchange. .
0
0
0
RT @mubix: Yup… every single time….
0
5
0
A year ago I would not have bothered attempting to get into an account with MFA, but last week I used this same technique and got 8 accounts in an org over 2 days on a remote SE test. MFA is snake oil.
grahamcluley.com
Uber has suffered a security breach which allowed a hacker to break into its network, and access the company’s internal documents and systems. How did they do it? By bombarding an employee with a…
0
0
0
RT @gentilkiwi: Always fabulous to see editors low the Windows Security level. When Citrix SSO is enabled. passwords are stored in *user….
0
296
0
I don't rate the new lock screen clock in iOS 16 🤨
Tweet media one
0
0
1
So weird out of all the fancy places in London this ceremony happens outside what is now just a fancy shopping mall
Tweet media one
0
0
0
Oh nice! This was a feature of Burp that I hadn't noticed was added.
Tweet media one
0
0
0
RT @Nettitude_Labs: Learn four of the most effective network relaying attacks against Windows domains. Defenders - learn how to mitigate ag….
Tweet card summary image
lrqa.com
Network relaying abuse in the context of a legacy Windows authentication protocol is by no means a novel vector for privilege escalation in a domain context.
0
45
0
When were the terms of service for Truth Social written?
Tweet media one
0
0
0
RT @mubix: This is something you should watch. These two individuals know more about scanning than a very large majority of Infosec combine….
0
73
0