buffaloverflow's profile picture. Red Team & Offensive Security Research @AmberWolfSec // @buffaloverflow.rw.md on bsky

Rich Warren

@buffaloverflow

Red Team & Offensive Security Research @AmberWolfSec // @buffaloverflow.rw.md on bsky

Had an awesome time at RedTreat. Thanks to the @OutflankNL and @MDSecLabs crew for organising, and all the speakers and attendees for the cool talks and discussions! 🏝️👏

#RedTreat2025 is a wrap @StanHacked @MarcOverIP - thanks to all the speakers and the panel team for an extra awesome con this year 🫶

domchell's tweet image. #RedTreat2025 is a wrap @StanHacked @MarcOverIP - thanks to all the speakers and the panel team for an extra awesome con this year 🫶


Playing the long game

Visiting NCC Group’s blogs right now feels like a CTF challenge: decipher the mangled text while dodging XSS pop-ups. Better to use web archive to see the original content but they have even changed the URLs! Example: nccgroup.com/research-blog/… The fox-it.com etc are…

irsdl's tweet image. Visiting NCC Group’s blogs right now feels like a CTF challenge: decipher the mangled text while dodging XSS pop-ups. Better to use web archive to see the original content but they have even changed the URLs!
Example: 
nccgroup.com/research-blog/…
The fox-it.com etc are…


What comes after the patch? Bypass of course! 😜 Delinea Protocol Handler RCE - Return of the MSI. By my colleague @johnnyspandex blog.amberwolf.com/blog/2025/augu…

Normalization strikes again 🎯 Delinea Secret Server Protocol Handler RCE: blog.amberwolf.com/blog/2024/dece… By @johnnyspandex



👀

buffaloverflow's tweet image. 👀

Someone brought it to my attention that Zscaler is using their 500,000,000,000 daily customer logs to train Artificial Intelligence. ... does this not seem like a problem ... ?

vxunderground's tweet image. Someone brought it to my attention that Zscaler is using their 500,000,000,000 daily customer logs to train Artificial Intelligence.

... does this not seem like a problem ... ?


Bug bounty platforms can often be misused as NDA as a service. As a general rule, I avoid reporting via bbp for this very reason

why would i report free bugs to bugcrowd vdp just for vendors to say “never disclose”? that disclosure policy is not it. better to go security@ with project zero deadlines, 90 days, then i share it with the community.



If you missed the talk, we uploaded the video here: vimeo.com/1109180896

buffaloverflow's tweet card. DEF CON 33 - Zero Trust, Total Bust: Breaking into Thousands of...

vimeo.com

Vimeo

DEF CON 33 - Zero Trust, Total Bust: Breaking into Thousands of...

Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.

AmberWolfSec's tweet image. Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.


Just published the writeup for the "Netskope cross-tenant authentication bypass" featured in our #defcon33 talk #ZeroTrustTotalBust Find the full details here 👇 blog.amberwolf.com/blog/2025/augu… ^We also cover another method to leak those not-so-secret OrgKeys 😉

buffaloverflow's tweet image. Just published the writeup for the "Netskope cross-tenant authentication bypass" featured in our #defcon33 talk #ZeroTrustTotalBust

Find the full details here 👇

blog.amberwolf.com/blog/2025/augu…

^We also cover another method to leak those not-so-secret OrgKeys 😉

Netskope have released NSKPSA-2025-002 / CVE-2025-0309 for one of the privilege escalation vulnerabilities discussed during our #ZeroTrustTotalBust DEFCON talk Full writeup and PoC to follow on the @AmberWolfSec blog😉 netskope.com/company/securi…


There's a thread on LinkedIn where ZTNA sales folk are using our research to shill their own product - just to be pointed to writeups of the same vulns affecting their own product. It's very entertaining to watch.


Rich Warren reposted

A special shoutout to the many 🇪🇺European cyber researchers presenting their work at #DEFCON, you were awesome. 🇳🇱@_dirkjan @John_Fokker 🇮🇹@Van1sh_BSidesIT 🇫🇷@christophetd @fr0gger_ @kalimer0x00 🇧🇪@RedByte1337 🇨🇿@marektoth 🇬🇧@_mattmuir @johnnyspandex @buffaloverflow +many others

Wietze's tweet image. A special shoutout to the many 🇪🇺European cyber researchers presenting their work at #DEFCON, you were awesome.

🇳🇱@_dirkjan @John_Fokker
🇮🇹@Van1sh_BSidesIT
🇫🇷@christophetd @fr0gger_ @kalimer0x00
🇧🇪@RedByte1337
🇨🇿@marektoth
🇬🇧@_mattmuir @johnnyspandex @buffaloverflow
+many others

Rich Warren reposted

CVE-2025-3831 Log files uploaded during troubleshooting by the Harmony SASE agent may have been accessible to unauthorized parties. cve.org/CVERecord?id=C…


Rich Warren reposted
AmberWolfSec's tweet image.

Rich Warren reposted

You can read about our overall research project at blog.amberwolf.com/blog/2025/augu… and learn about a SAML Authentication bypass in Zscaler (CVE-2025-54982) at blog.amberwolf.com/blog/2025/augu…


Rich Warren reposted

Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.

AmberWolfSec's tweet image. Breaking Into Your Network? Zer0 Effort. - DEF CON 33 Overview and Advisory - Zscaler SAML Authentication Bypass (CVE-2025-54982). Following on from our DEF CON 33 presentation, the first two blog posts in our series on Zero Trust Network access abuse are now live.

🤣🤣

@johnnyspandex & @buffaloverflow bout to put two fists into zero trust

rbmaslen's tweet image. @johnnyspandex & @buffaloverflow  bout to put two fists into zero trust


Rich Warren reposted

Maybe some info at #defcon33 on Saturday, Track 3, 15:30 "Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug"

AmberWolfSec's tweet image. Maybe some info at #defcon33 on Saturday, Track 3, 15:30 "Zero Trust, Total Bust - Breaking into thousands of cloud-based VPNs with one bug"

not much info about it but: 🟥 CVE-2025-54982, CVSS: 9.6 (#Critical) Zscaler SAML Authentication A critical vulnerability due to improper verification of cryptographic signatures in Zscaler's SAML authentication mechanism, allowing authentication abuse. #CyberSecurity #CVE



Loading...

Something went wrong.


Something went wrong.