Anthony Weems Profile Banner
Anthony Weems Profile
Anthony Weems

@amlweems

Followers
2,897
Following
253
Media
8
Statuses
171

Cloud Vulnerability Research • The opinions stated here are my own, not those of my company.

Joined April 2008
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@amlweems
Anthony Weems
5 months
I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)
Tweet media one
53
898
4K
@amlweems
Anthony Weems
3 years
Just finished Portswigger's new Burp Suite Certification. I've always been a huge fan of the @WebSecAcademy and this is an excellent capstone on the labs. Thanks @PortSwigger for all the educational content! #burpsuitecertified
3
3
57
@amlweems
Anthony Weems
4 years
@WebSecAcademy Thanks for this round of labs! The last two are definitely the most challenging. For anyone stuck, I *highly* recommend this blog post from @_atorralba : . Although the conditions are different, it's an excellent walkthrough of the process.
2
1
20
@amlweems
Anthony Weems
3 years
I'm really excited for this video! I got a chance to collab with @LiveOverflow and share the process for discovering the localhost bypass for CVE-2021-45046 with code review and differential fuzzing. :)
@LiveOverflow
LiveOverflow 🔴
3 years
After the log4shell vulnerability was patched with version 2.15, another CVE was assigned. Let's have a closer look at the localhost JNDI connections bypass and learn about fuzzing Java applications.
1
27
136
2
2
19
@amlweems
Anthony Weems
3 years
My team @praetorianlabs just published our work in reverse engineering the Proxylogon patches for CVE-2021-26857, CVE-2021-26855, and CVE-2021-27065. I learned a lot more about Exchange than I thought I'd ever need, but had a blast.
1
5
17
@amlweems
Anthony Weems
3 years
@albinowax @webtonull A few years ago I accidentally found a vuln like this while using Turbo Intruder for password guessing. Was getting inconsistent results (e.g. valid session for a user with an invalid password). Thought I'd found a bug in Turbo Intruder, but it was a race condition in my target.
0
2
15
@amlweems
Anthony Weems
5 months
@julianor It turns out there is an option to sign the full command, I've updated the repo to clarify.
3
0
7
@amlweems
Anthony Weems
5 months
@solardiz This is an excellent point, I had only been considering the simple case where the values were e.g. 2*1+0, but it makes more sense that they'd be large ints to look less suspicious. I'll update the .patch later today.
1
0
5
@amlweems
Anthony Weems
5 months
@julianor @vx__notduck1e @CodeAsm_ I've tested and signature replay works as expected, allowing modification of the command (except the first 5 chars). But I agree it is unrealistic until we actually capture a real signature (which may never happen).
0
0
6
@amlweems
Anthony Weems
4 years
Awesome new work from @albinowax on cache poisoning. Cache Key Injection especially feels like it should have some interesting variants.
2
0
5
@amlweems
Anthony Weems
1 year
@0xdabbad00 Nice catch, the Zenbleed advisory should be back up as GCP-2023-020 now.
1
0
5
@amlweems
Anthony Weems
6 years
This is one of the most exciting projects I got to work on last year. 🙂
@praetorianlabs
Praetorian
6 years
0
0
3
0
1
5
@amlweems
Anthony Weems
3 years
Thanks for the seamless contribution process! Cheers to @BouncyHat and @dallasl1200 😄
@maddiestone
Maddie Stone
3 years
Thanks to @amlweems , Michael Weber, and Dallas Kaman for performing an analysis on CVE-2021-26855, the Microsoft Exchange SSRF vuln!
0
9
26
0
0
5
@amlweems
Anthony Weems
4 years
Thanks, this was a lot of fun! *honk honk*
@honkci
honkci
4 years
Our next winner is @amlweems ! So proud of all you geese being all chaotic. :)
0
1
10
0
0
4
@amlweems
Anthony Weems
9 years
Super interesting talk by Rob Joyce, NSA TAO Chief.
0
1
3
@amlweems
Anthony Weems
4 years
0
0
3
@amlweems
Anthony Weems
5 months
@therealshodan Did you capture SSH certificates as well? The payload is embedded in the CA signing key in the cert and will always start with 16 bytes that match a specific pattern. (see for the payload format)
1
0
3
@amlweems
Anthony Weems
7 years
After you've read our magazine, go do some crypto puzzles! 🙂
@praetorianlabs
Praetorian
7 years
Praetorian has 7 open #security positions from #redteam to #iot . Read our magazine to see what life is like here >>
Tweet media one
0
17
16
0
1
3
@amlweems
Anthony Weems
8 years
@nathansportsman just an interface here... some Python code there... annndd (boom)!
0
0
2
@amlweems
Anthony Weems
8 years
@OstensiblyKathy Current status: watching teapots come alive.
1
0
1
@amlweems
Anthony Weems
5 months
@therealshodan fyi: if you search for keys, the magic command byte can be obfuscated, I've updated the code with an example.
0
0
2
@amlweems
Anthony Weems
9 years
Our new tech challenge is live! I encourage anyone interested in machine learning to check it out!
@praetorianlabs
Praetorian
9 years
Ready to play? Train a machine learning classifier to identify random binary architecture:
Tweet media one
1
4
10
0
0
2
@amlweems
Anthony Weems
4 years
Tweet media one
1
0
2
@amlweems
Anthony Weems
8 years
@ctfhacker right?! Live stream is pretty dope. Maybe even #d2qd
1
0
2
@amlweems
Anthony Weems
4 years
Also, some great new labs on @WebSecAcademy to go along with the research. Thank you for continuing to create free educational content like this.
1
0
2
@amlweems
Anthony Weems
8 years
. @cfthacker shellphish just announced their CRS will be open sourced after CGC!
0
0
1
@amlweems
Anthony Weems
4 years
@WebSecAcademy Getting /error redirects for the 'Cache key injection' lab 🙃
2
0
1
@amlweems
Anthony Weems
9 years
Shout out to @b1ack0wl for his awesome project! :D
@binitamshah
Binni Shah
9 years
Getting Started with Damn Vulnerable Router Firmware (DVRF) v0.1 :
0
30
46
0
0
1
@amlweems
Anthony Weems
10 years
"It's like drinking milk with your eyes and nose closed and plugged." - @JDong42 #jobsearch #redhat
0
0
1
@amlweems
Anthony Weems
7 years
@christianpanton @hanno I love the ASCII art :)
Tweet media one
0
0
0
@amlweems
Anthony Weems
4 years
@mholt6 Ahh, you're right. I forgot the tag is what kicks off the action in the first place.
0
0
1
@amlweems
Anthony Weems
8 years
@kelbyludwig I am SO down for games with @ctfhacker , gotta show the new hires some good fun
0
0
1
@amlweems
Anthony Weems
7 years
This is an awesome talk about containers, compile-time seccomp, and multi-tenancy.
0
0
1
@amlweems
Anthony Weems
5 months
@bl4sty @julianor Yeah, I noticed this and was wondering if it was a bug. It seems strange to allow setting the request type but not the body.
0
0
1
@amlweems
Anthony Weems
8 years
@OstensiblyKathy the fig newton storyline is one of my favorites on your Twitter.
1
0
1
@amlweems
Anthony Weems
8 years
@OstensiblyKathy Did you know you're supposed to "season" your cutting board during its first week in your home? Fun fact.
0
0
1
@amlweems
Anthony Weems
8 years
@ctfhacker there was a vuln that the CGC operators didn't know about, discovered by one of the teams
1
1
1
@amlweems
Anthony Weems
8 years
. @ctfhacker also, one bot found an unknown vuln and the other bot patched it after observing the attempted pov #d2qd
0
0
1
@amlweems
Anthony Weems
4 years
@albinowax @WebSecAcademy @_atorralba Not yet! 😛 I agree though, it definitely feels possible.
1
0
1
@amlweems
Anthony Weems
4 years
@mholt6 It looks like these steps in the gorelease hooks are responsible for sending the early request to the module proxy.
Tweet media one
1
0
1
@amlweems
Anthony Weems
8 years
@OstensiblyKathy this was me fifteen minutes ago
1
0
1
@amlweems
Anthony Weems
9 years
Excellent write-up, nice job! :D
My writeup for @superkojiman 's Brainpan3 featuring Binjitsu and Pwndbg: http://t.co/2KzKYmt58Q
0
18
19
0
0
1
@amlweems
Anthony Weems
9 years
. @kelbyludwig We should look into this, sounds interesting. #d2qd
2
0
1
@amlweems
Anthony Weems
9 years
All of our password hashing recommendations rolled in to ONE blog post. @kelbyludwig 's content is #2dcc .
@praetorianlabs
Praetorian
9 years
Secure Password Storage in Go, Python, Ruby, Java, Haskell, and NodeJS via @kelbyludwig
1
15
18
1
0
1
@amlweems
Anthony Weems
9 years
A year of senior design paying off. 😀
1
0
1
@amlweems
Anthony Weems
9 years
By far my favorite book/movie combo of the year. #TheMartian #RobinsonCrusoeOnMars http://t.co/6pQ6uG403C
Tweet media one
0
0
0
@amlweems
Anthony Weems
9 years
. @ctfhacker d2qd to the max!
@praetorianlabs
Praetorian
9 years
Pentestly Framework: When Pentesting Meets Python and Powershell via @ctfhacker
Tweet media one
2
49
57
0
0
1
@amlweems
Anthony Weems
8 years
@b1ack0wl send an email to secalert @redhat .com with details, including name, website, description, and proof-of-concept. :D
1
0
1