AmberWolfSec Profile Banner
AmberWolf Profile
AmberWolf

@AmberWolfSec

Followers
331
Following
0
Statuses
19

Offensive Cyber, Risk Management & Governance, Vulnerability Research and Technical Due Diligence

UK
Joined February 2024
Don't wanna be here? Send us removal request.
@AmberWolfSec
AmberWolf
27 days
You can read our latest blog at
0
0
3
@AmberWolfSec
AmberWolf
2 months
All I want for Christmas is U(RL handlers not vulnerable to RCE)... AmberWolf has published information about CVE-2024-12908, a Remote Code Execution vulnerability in the Delinea Secret Server Protocol Handler. You can read our blog & PoC here:
2
9
34
@AmberWolfSec
AmberWolf
3 months
CVE-2024-5921 is a Remote Code Execution and Privilege Escalation vulnerability in Palo Alto Global Protect, which is also exploitable using NachoVPN. Our full technical write up is available here:
0
4
7
@AmberWolfSec
AmberWolf
3 months
RT @buffaloverflow: Heres the slides from our HackFest Hollywood talk.. We shared details on a new Palo Alto 0day and provide some tips on…
0
1
0
@AmberWolfSec
AmberWolf
3 months
AmberWolf is hiring experienced Red Team operators! Join our fun, supportive team if you have (or have had) CCSAS/CCSAM certs and a passion for delivering world-class engagements. Apply now: #hiring #RedTeam
0
3
6
@AmberWolfSec
AmberWolf
3 months
The slides for @buffaloverflow and @johnnyspandex's "Very Pwnable Networks: Exploiting the Top Corporate VPN Clients for Remote Root and SYSTEM Shells" are now available on our GitHub: #hackfest
0
47
107
@AmberWolfSec
AmberWolf
4 months
RT @jon__reiter: Richard and David from @AmberWolfSec speaking about Very Pwnable Networks: Exploiting the Top Corporate VPN Clients for R…
0
2
0
@AmberWolfSec
AmberWolf
4 months
45 minutes until AmberWolf researchers David Cash and Richard Warren present their research "Very Pwnable Networks: Exploiting the Top Corporate VPN Clients for Remote Root and SYSTEM Shells". You can register to watch live for free at
0
2
5
@AmberWolfSec
AmberWolf
4 months
🚨New Vulnerability: Authenticated RCE in Ivanti Connect Secure (CVE-2024-37404). Discovered by @buffaloverflow , this exploit grants root access via RCE. Read about the discovery, exploit method, and vendor mitigations here:
0
14
35
@AmberWolfSec
AmberWolf
5 months
Today, we released details for CVE-2024-45488, an authentication bypass in Safeguard for Privileged Passwords dubbed "Skeleton Cookie" We explain how we discovered it, provide scripts to check vulnerability, and show how it could lead to RCE on the server.
0
17
39
@AmberWolfSec
AmberWolf
5 months
🚨AmberWolf Security Researchers have discovered an auth bypass vulnerability in One Identity Safeguard for Privileged Passwords (CVE-2024-45488), allowing attackers full access to the Password Safe. Summary on our blog: Full technical blog coming soon!
0
9
6
@AmberWolfSec
AmberWolf
6 months
RT @buffaloverflow: Authentication bypass in Safeguard for Privileged Passwords, discovered by @johnnyspandex and myself Advisory from @Am
0
9
0
@AmberWolfSec
AmberWolf
6 months
Delighted that Richard Warren and David Cash will be presenting "Very Pwnable Networks: Exploiting the Top Corporate VPN Clients for Remote Root and SYSTEM Shells" at #SANSHackFest in October!
@SANSOffensive
SANS Offensive Operations
6 months
📣 The #SANSHackFest Agenda is LIVE & packed w/ highly technical talks from @dwizzzleMSFT @yarden_shafir @buffaloverflow & David Cash @33y0re & more! Join us in Hollywood for exclusive access to ALL talks, workshops, & challenges. ➡️ Agenda: #PenTest
Tweet media one
0
1
6
@AmberWolfSec
AmberWolf
7 months
AmberWolf researchers Richard Warren and David Cash found high-risk vulnerabilities in Cato Client, including remote code execution and SYSTEM privilege escalation. Learn more in our blog series: #vulnerability
Tweet media one
0
15
37