pyn3rd's profile picture. Security Researcher&Red Team&Cloud Security. BlackHat&HITB&CanSecWest Speaker.

pyn3rd

@pyn3rd

Security Researcher&Red Team&Cloud Security. BlackHat&HITB&CanSecWest Speaker.

pyn3rd reposted

I just published From XSS to RCE: Critical Vulnerability Chain in Anthropic MCP Inspector(CVE-2025–58444) medium.com/p/from-xss-to-…


Over coffee, found a vulnerability.

pyn3rd's tweet image. Over coffee, found a vulnerability.

pyn3rd reposted

🚨 New research: A cryptomining campaign is hijacking exposed PostgreSQL, hiding payloads in fake 404 pages, and abusing legit infra. Multiplatform, stealthy, and still active 👉 wiz.io/blog/soco404-m…

wiz_io's tweet image. 🚨 New research: A cryptomining campaign is hijacking exposed PostgreSQL, hiding payloads in fake 404 pages, and abusing legit infra. 
Multiplatform, stealthy, and still active 👉 wiz.io/blog/soco404-m…

#Bugcrowd Team's handling of my recent report has been absurd. I reported a bug 6 days ago, but they didn’t attempt to reproduce it right away. Today, after it was already fixed, they reproduced it and claimed the bug is no longer applicable, considering it theoretical.@Bugcrowd

pyn3rd's tweet image. #Bugcrowd Team's handling of my recent report has been absurd. I reported a bug 6 days ago, but they didn’t attempt to reproduce it right away. Today, after it was already fixed, they reproduced it and claimed the bug is no longer applicable, considering it theoretical.@Bugcrowd

Old but GOld! That's a good one!

WAF bypass via junk data [this trick has been around for 13 years] exploit-db.com/exploits/18840 Do not forget: Hackerone is a scam

h4x0r_dz's tweet image. WAF bypass via junk data [this trick has been around for 13 years] 

exploit-db.com/exploits/18840

Do not forget: Hackerone is a scam


pyn3rd reposted

We (+@sagitz_ @ronenshh @hillai) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX". The impact? From zero permissions ➡️ to complete cluster takeover 🤯 This is the story of #IngressNightmare 🧵⬇️

nirohfeld's tweet image. We (+@sagitz_ @ronenshh @hillai) found a series of unauthenticated RCEs in core @KubernetesIO project "Ingress-NGINX".

The impact?

From zero permissions ➡️ to complete cluster takeover 🤯

This is the story of #IngressNightmare 🧵⬇️

It was a genuine pleasure meeting @infosec_au in Sydney and receiving your insightful advice and valuable information. Thank you! Hope to see you again soon!


pyn3rd reposted

Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

artsploit's tweet image. Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more! Read it all below 🧵

I truly appreciate @albinowax's kind help in adding both my blog and slides to Web Hacking Techniques 2024.Thank you so much!


#CVE-2024-49194 Databricks JDBC Driver via JAAS, Make JDBC Attack Great Again!! I’ve included the link to my write-up below. Enjoy!! blog.pyn3rd.com/2024/12/13/Dat…


Activiti is a lightweight workflow and Business Process Management (BPM) platform that supports Expression Language expressions within its flows. In this example, I demonstrate how to exploit this feature to trigger RCE in a SpringBoot environment.


Use MSSQL CLR Assembly To Bypass EDR blog.pyn3rd.com/2024/11/22/How…


XSS based on DNS CNAME Type Record

pyn3rd's tweet image. XSS based on DNS CNAME Type Record
pyn3rd's tweet image. XSS based on DNS CNAME Type Record

I’m developing a DNS server that responds with random IP addresses and tracks response times. It’s designed to handle a high volume of cache-miss queries for DNS caching, like Local DNS Server.

pyn3rd's tweet image. I’m developing a DNS server that responds with random IP addresses and tracks response times. It’s designed to handle a high volume of cache-miss queries for DNS caching, like Local DNS Server.

I developed an SSH client rootkit to test EDR detection. When a user logs in, it captures the root password and sends it covertly via a DNS TKEY record. With high daily DNS traffic, EDR systems are unlikely to flag this, as analyzing every query would impact performance.

pyn3rd's tweet image. I developed an SSH client rootkit to test EDR detection. When a user logs in, it captures the root password and sends it covertly via a DNS TKEY record. With high daily DNS traffic, EDR systems are unlikely to flag this, as analyzing every query would impact performance.

pyn3rd reposted

Just read "Make JDBC Attacks Brilliant Again", a fantastic 3-year-old research piece that @pyn3rd recently recommended to me. It starts with JDBC attack principles and root causes, dives deep into implementation issues—including their discovery of a Weblogic RCE—unveils new…

tonghuaroot's tweet card. #HITB2021SIN D1T2 - Make JDBC Attacks Brilliant Again - Xu Yuanzhen &...

youtube.com

YouTube

#HITB2021SIN D1T2 - Make JDBC Attacks Brilliant Again - Xu Yuanzhen &...


#CVE-2024-21216 Weblogic Remote Code Execution via T3/IIOP

pyn3rd's tweet image. #CVE-2024-21216 Weblogic Remote Code Execution via T3/IIOP

Loading...

Something went wrong.


Something went wrong.