I’ve wondered this for a while (especially when it comes to the private sector job market). Few Interesting Findings From Analyzing Data: ~1% of Global LinkedIn computer security related profiles mention memory corruption terms ( 22K/1.950M) ~1% of US LinkedIn computer security profiles mention memory corruption terms (11K/909K) ~501 Researches have submitted Memory Corruption bugs…
All posts by justintaft
How To Break Into Application Security
So you want to be a white hat hacker? Computer Security is a fascinating field and can be quite rewarding. The work you do will protect people’s privacy, prevent fraud , and can even save people’s lives when working on critical systems. Having a college degree isn’t necessary. What’s more important is training yourself to…
Binary Reversing Methodologies
There’s an interesting quote that said the ability to take finer measurements allows leaps in the advances of science. Looking back at when I started to reverse engineer as a kid, it’s cool to see how I may approach problems differently as I learned new techniques. Uncovering Structure of Target Binary Detecting Decryption vs CompressionIf…
A note to my past self about stock market investing
Below is not investing / financial advice and may not be accurate. Read JL Collin’s book on a Simple Path To Wealth. It decomplexes investing. Max out employee 401k contributions. It’s free money. Do not try and beat the market. Stick with index tracking securities (VT,VTI, VXUS,VOO,BND,BNDX). Put money into the market every month. Setup…
CVE-2020-16225: TPEditor v1.96 Code Execution via Memory Corruption
TLDR; TPEditor v1.96 does not perform bound checking when copying “boot page” (.sta) file content to memory. The finding can be exploited to gain arbitrary code execution upon file opening. Greetz to @mufinnnnnnn who paired up with me on the review. It was a highly collaborative effort to discover and exploit the bug. [ZDI Link] This…
CVE-2021-29084: Exploiting CRLF Header Injection in Synology NAS for Unauthenticated File Downloads
Recently my CVE-2021-29084 went public [ZDI Link]. We thought it would be fun to share my disclosure notes. TLDR; The Synology DS418play NAS contained an unauthenticated accessible endpoint vulnerable to HTTP header injection. Due to nginx’s configuration, the X-Accel-Redirect header can be used download files which are shared via SMB. Note the finding requires knowledge…
Exporting Bitwarden Vault Items When Master Password Is Forgotten But TouchID Unlock Is Enabled
Disclaimer: If you have access to your Bitwarden Vault items, it’s best to make a copy of all vault items ASAP. Create a new Bitwarden account without logging out of the old account, SAVE A COPY OF THE NEW ACCOUNT’S MASTER PASSWORD, and then copy vault items into the new account manually. Tampering with Bitwarden is NOT recommended,…
Scaling A Read Heavy WordPress Blog
I finally caved in. I migrated to WordPress. I know I know, it’s not that impressive or news worthy. However it does reflect me getting older and wanting to simplify my life. Keeping the end goals in mind and keeping things (relatively) simple to achieve them. My last setup was pretty scalable. My site was…
On Emacs
Over the last 20 years I’ve used many environments for programming and editing files (vim, Emacs, Eclipse, NetBeans, PHPStorm, Visual Studio, just to name some). While I will use the right tool for the right job, I’m partial to Emacs. Emacs is easy to extend – You can modify Emacs while it’s running, within Emacs.…
.NET Deserilization Gadgets
The use of BinaryFormatter in .NET applications often leads to Remote Code Execution quite easily. See https://github.com/pwntester/ysoserial.net for example gadgets. When testing the TypeConfuseDelegate payload in your own project, a couple of exceptions may be thrown: ‘Object must implement IConvertible’ – This occurs when the appropriate deserialization types can not be found. Check to ensure…