<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Pages on Willis Vandevanter</title><link>https://silentrobots.com/page/</link><description>Recent content in Pages on Willis Vandevanter</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 16 May 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://silentrobots.com/page/index.xml" rel="self" type="application/rss+xml"/><item><title>Advisories</title><link>https://silentrobots.com/advisories/</link><pubDate>Mon, 16 May 2022 00:00:00 +0000</pubDate><guid>https://silentrobots.com/advisories/</guid><description>&lt;ul&gt;
&lt;li&gt;CVE-2025-6031 - Amazon Cloud Cam&lt;/li&gt;
&lt;li&gt;Multiple Advisories in SAP Products&lt;/li&gt;
&lt;li&gt;CVE-2014-9320&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A critical privilege escalation vulnerability found using a fun fuzzing technique for BO&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 2039905&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/" target="_blank" rel="noopener"
 &gt;Denial of Service XML Expansion (CVE-2014-8080)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;For good reason it wasn&amp;rsquo;t advertised, the PoC could remotely DoS any Rails installation with little effort.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2014-08-06/sa-core-2014-004-drupal-core-denial" target="_blank" rel="noopener"
 &gt;CVE-2014-5265, CVE-2014-5266, CVE-2014-5267&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;This impacted all versions of Drupal and Wordpress.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://seclists.org/fulldisclosure/2014/Oct/36" target="_blank" rel="noopener"
 &gt;SAP HANA Web-based Development Workbench Code Injection (SAP Advisory 2015446)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="link" href="https://seclists.org/fulldisclosure/2014/Oct/42" target="_blank" rel="noopener"
 &gt;Unauthenticated Username Enumeration in Business Objects (SAP Advisory 2001109)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="link" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8310" target="_blank" rel="noopener"
 &gt;Unauthenticated Remote Crash of Business Objects (CVE-2014-8310)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Also found via the same fuzzing technique&lt;/li&gt;
&lt;li&gt;SAP Advisory 2001106&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8311" target="_blank" rel="noopener"
 &gt;Information Disclosure in Business Objects (CVE-2014-8311)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 1998990&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8308" target="_blank" rel="noopener"
 &gt;XSS in Business Objects (CVE-2014-8308)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 1941562&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8314" target="_blank" rel="noopener"
 &gt;Multiple XSS in SAP HANA (CVE-2014-8314)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 2009696&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://nvd.nist.gov/vuln/detail/CVE-2014-5172" target="_blank" rel="noopener"
 &gt;Multiple XSS in SAP HANA (CVE-2014-5172)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 1993349&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3134" target="_blank" rel="noopener"
 &gt;Multiple XSS in SAP BO (CVE-2014-3134)&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;SAP Advisory 1931399&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=451071888" target="_blank" rel="noopener"
 &gt;Multiple Advisories in SAP Products&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="link" href="https://nvd.nist.gov/vuln/detail/cve-2010-0219" target="_blank" rel="noopener"
 &gt;CVE-2010-0219&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On paper, it was a default password issue 🤷. In practice, it was an application that was packaged with many products that allowed trivial RCE out of the box and a nice metasploit module.&lt;/li&gt;
&lt;li&gt;SAP Advisory 1432881&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://seclists.org/bugtraq/2010/Aug/359" target="_blank" rel="noopener"
 &gt;FCKEditor.NET File Upload Code Execution&lt;/a&gt;&lt;/p&gt;
&lt;h1 id="selected-bug-bounties"&gt;Selected Bug Bounties
&lt;/h1&gt;&lt;p&gt;I have had a mixed experience with bug bounties. I think in total I have received a bounty or Hall of Fame from 40+ companies; not a ton but enough to see some of the good and bad. Below are some programs I really enjoyed participating with.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;AT&amp;amp;T&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Top 50 hacker at one point.&lt;/p&gt;
&lt;p&gt;&lt;a class="link" href="https://www.bugcrowd.com/blog/the-2018-mvp-researchers/" target="_blank" rel="noopener"
 &gt;Bugcrowd MVP 2018&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;2019 I had the points and bugs, but one of the programs unfairly gave me a negative rating which dropped me below the threshold. As you can tell, I am still salty 👷.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://www.mozilla.org/en-US/security/bug-bounty/web-hall-of-fame/" target="_blank" rel="noopener"
 &gt;Mozilla&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;I believe I had the highest payout for a Web bounty up to that point.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://bugcrowd.com/tesla/hall-of-fame" target="_blank" rel="noopener"
 &gt;Tesla&lt;/a&gt;
&lt;a class="link" href="https://bugcrowd.com/" target="_blank" rel="noopener"
 &gt;HP&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;I had a handful of critical bugs in devices including RCE but the details are unfortunately private.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="link" href="https://hackerone.com/ibm/thanks" target="_blank" rel="noopener"
 &gt;IBM&lt;/a&gt;
&lt;a class="link" href="https://hackerone.com/slack/thanks" target="_blank" rel="noopener"
 &gt;Slack&lt;/a&gt;&lt;/p&gt;</description></item><item><title>Presentations + Trainings</title><link>https://silentrobots.com/presentations/</link><pubDate>Mon, 16 May 2022 00:00:00 +0000</pubDate><guid>https://silentrobots.com/presentations/</guid><description>&lt;h2 id="owasp-global-appsec-2024"&gt;OWASP Global AppSec 2024
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://www.youtube.com/watch?v=1TdpDBZj7RA" target="_blank" rel="noopener"
 &gt;GraphQL Exploitation: Secondary Context Attacks and Business Logic Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="defcon-recon-village-2024"&gt;Defcon Recon Village 2024
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://www.youtube.com/watch?v=HY69ARr0b6M" target="_blank" rel="noopener"
 &gt;Bypassing WHOIS Rate Limiting &amp;amp; Tracking Fresh Domains&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="las-vegas-bsides-2024"&gt;Las Vegas BSides 2024
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://www.youtube.com/watch?v=zGBty3bXORU" target="_blank" rel="noopener"
 &gt;Bypassing WHOIS Rate Limiting &amp;amp; Tracking Fresh Domains&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-usa-trainings-2019-accepted"&gt;Black Hat USA Trainings 2019 (Accepted)
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class="link" href="https://twitter.com/blackhatevents/status/1109123860555878401" target="_blank" rel="noopener"
 &gt;&amp;ldquo;The Web Application Hacker Level-Up Lab&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Unfortunately we couldn&amp;rsquo;t fill the class in Las Vegas. It was delivered in Buenos Aires instead with the help of Include Security. Thank you!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="owasp-maine"&gt;OWASP Maine
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Best Fit Mapping Attacks&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="pluralsight-training-2017"&gt;Pluralsight Training 2017
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.pluralsight.com/courses/writing-penetration-testing-reports" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Writing Penetration Testing Reports&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="pluralsight-training-2016"&gt;Pluralsight Training 2016
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.pluralsight.com/courses/external-footprinting-reconnaissance-mapping" target="_blank" rel="noopener"
 &gt;&amp;ldquo;External Footprinting: Reconnaissance and Mapping&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-usa-arsenal-2016"&gt;Black Hat USA Arsenal 2016
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Overview: &lt;a class="link" href="https://www.blackhat.com/us-16/arsenal.html#serpico" target="_blank" rel="noopener"
 &gt;&amp;ldquo;SERPICO&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-usa-2015"&gt;Black Hat USA 2015
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.youtube.com/watch?v=LZUlw8hHp44" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Exploiting XXE in File Upload Functionality&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-webcast-november-2015"&gt;Black Hat Webcast November, 2015
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Webinar: &lt;a class="link" href="https://www.blackhat.com/html/webcast/11192015-exploiting-xml-entity-vulnerabilities-in-file-parsing-functionality.html" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Exploiting XXE in File Upload Functionality&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;The webinar was updated to include more file types; PDF, JPG, and GIF&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="beacon-2015"&gt;BeaCon 2015
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&amp;ldquo;Building (Simple) Fuzzing Scripts from Wireshark Dissectors&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-usa-arsenal-2015"&gt;Black Hat USA Arsenal 2015
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Overview: &lt;a class="link" href="https://www.blackhat.com/us-15/arsenal.html#serpico" target="_blank" rel="noopener"
 &gt;&amp;ldquo;SERPICO&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="black-hat-europe-2014"&gt;Black Hat Europe 2014
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video/Slides: &lt;a class="link" href="https://www.blackhat.com/eu-14/briefings.html#blended-web-and-database-attacks-on-real-time-in-memory-platforms" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Blended Web and Database Attacks on Real-Time, In-Memory Platforms&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;I couldn&amp;rsquo;t make the talk unfortunately.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="troopers-2014"&gt;Troopers 2014
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://troopers.de/events/troopers14/41_hiding_the_breadcrumbs_anti-forensics_on_sap_systems/" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Hiding the breadcrumbs: Anti-forensics on SAP systems&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Really fun presentation on hiding actions in SAP&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="troopers-2014-1"&gt;Troopers 2014
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://troopers.de/events/troopers14/39_sap_businessobjects_attacks_espionage_and_poisoning_of_business_intelligence_platforms/" target="_blank" rel="noopener"
 &gt;&amp;ldquo;SAP BusinessObjects Attacks: Espionage and Poisoning of Business Intelligence platforms&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Another round of BO research, quite a few advisories came from this.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="blackhat-arsenal-2014"&gt;BlackHat Arsenal 2014
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Overview: &lt;a class="link" href="https://www.blackhat.com/us-15/arsenal.html#serpico" target="_blank" rel="noopener"
 &gt;&amp;ldquo;SERPICO&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="rapid7-whiteboard-wednesday"&gt;Rapid7 Whiteboard Wednesday
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Post/Video: &lt;a class="link" href="https://www.rapid7.com/blog/post/2013/03/27/open-s3-buckets/" target="_blank" rel="noopener"
 &gt;&amp;ldquo;There&amp;rsquo;s a Hole in 1,951 Amazon S3 Buckets&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="defcon-skytalks-20-2012"&gt;Defcon Skytalks 20 (2012)
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&amp;ldquo;Interface Puncher&amp;rdquo;
&lt;ul&gt;
&lt;li&gt;This talk focused on fingerprinting web applications and bruteforcing credentials. Cool idea, but didn&amp;rsquo;t really take off.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="defcon-19-2011"&gt;Defcon 19 (2011)
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.youtube.com/watch?v=LbzgHN5_BDM" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Metasploit vSploit Modules&amp;rdquo;&lt;/a&gt;
&lt;ul&gt;
&lt;li&gt;Joint presentation with Marcus Carey and David Rude. Awesome idea and fun work. Presentation wasn&amp;rsquo;t great though.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="defcon-skytalks-las-vegas-2011"&gt;Defcon Skytalks Las Vegas 2011
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&amp;ldquo;Distributed Denial of Service Attacks for Whitehats&amp;rdquo;
&lt;ul&gt;
&lt;li&gt;Focused on testing DoS mitigations in place from vendors. Unfortunately can&amp;rsquo;t find the slides or video.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="bsides-las-vegas-2011"&gt;BSides Las Vegas 2011
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&amp;ldquo;Distributed Denial of Service Attacks for Whitehats&amp;rdquo;
&lt;ul&gt;
&lt;li&gt;Focused on testing DoS mitigations provided by vendors. Unfortunately can&amp;rsquo;t find the slides or video.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="owasp-appsec-usa-2010"&gt;OWASP AppSec USA 2010
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.youtube.com/watch?v=b8rE-eZsdTs" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Hacking SAP Businessobjects&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="source-barcelona-2010"&gt;SOURCE Barcelona 2010
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;Video: &lt;a class="link" href="https://www.youtube.com/watch?v=b8rE-eZsdTs" target="_blank" rel="noopener"
 &gt;&amp;ldquo;Hacking SAP Businessobjects&amp;rdquo;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>About this site</title><link>https://silentrobots.com/about/</link><pubDate>Sun, 15 May 2022 00:00:00 +0000</pubDate><guid>https://silentrobots.com/about/</guid><description>
 &lt;blockquote&gt;
 &lt;p&gt;“Always Student, Never Master”&lt;/p&gt;

 &lt;/blockquote&gt;
&lt;p&gt;I use this site to publish technical content.&lt;/p&gt;</description></item><item><title>Archives</title><link>https://silentrobots.com/archives/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://silentrobots.com/archives/</guid><description/></item><item><title>Search</title><link>https://silentrobots.com/search/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://silentrobots.com/search/</guid><description/></item></channel></rss>