Erik Wynter's Avatar

Erik Wynter

@wyntererik

Making computers go boop instead of beep. Metasploit Contributor. Once-upon-a-time political scientist. No gods, no masters, no borders. 🏴 He/Him/They/Them

38
Followers
93
Following
27
Posts
03.07.2023
Joined
Posts Following

Latest posts by Erik Wynter @wyntererik

Screenshot of TIOBE index ranking for Fortran, reading:
This Month: 10
This Month Last Year: 12
Change: ^
Programming Language: Fortran
Ratings: 1.79%
Change: +0.72%

Screenshot of TIOBE index ranking for Fortran, reading: This Month: 10 This Month Last Year: 12 Change: ^ Programming Language: Fortran Ratings: 1.79% Change: +0.72%

Brb, need to update my resume. Changing "wrote Fortran exploit for the lulz" to "crafted totally serious exploit in the 10th most popular programming language in the world". Sauce: www.tiobe.com/tiobe-index/

19.12.2024 21:21 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Metasploit Weekly Wrap-Up 11/22/2024 | Rapid7 Blog

Roses are red, the sky is blue β€”
This week's #Metasploit wrap-up has Windows secrets dump improvements (and a JetBrains TeamCity login scanner, too!)

We're bad at poetry but good at shells. Check out the latest. www.rapid7.com/blog/post/20...

22.11.2024 21:01 πŸ‘ 11 πŸ” 7 πŸ’¬ 0 πŸ“Œ 0
Screenshot of upcoming disclosure from ZDI with the below text:

ZDI CAN: ZDI-CAN-22675
VENDOR(S): SonicWALL
SEVERITY:	CVSS: 7.1
REPORTED: 2024-03-27 (0 days ago)
DEADLINE: 2024-07-25
	
Discovered by: Erik Wynter

Screenshot of upcoming disclosure from ZDI with the below text: ZDI CAN: ZDI-CAN-22675 VENDOR(S): SonicWALL SEVERITY: CVSS: 7.1 REPORTED: 2024-03-27 (0 days ago) DEADLINE: 2024-07-25 Discovered by: Erik Wynter

So I did a thing...

27.03.2024 20:27 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

I think I speak for everyone when I say that the world will be a better place if the Teams outage is never fixed.

26.01.2024 18:48 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Purging Teams from my phone has been by far the best mental health decision I've made in years. 10/10 would delete again.

19.01.2024 23:18 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

- Have you tried this pentesting tool?
- Ah that's interes- It has a swastika in the logo
- You're so funny. It's pretty innovative bec-
- It has a swastika in the logo
- It's really cool how-
- It has a swastika in the logo
- Seriously though, I use-
- Swastika. In. Logo.

19.01.2024 21:40 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
A cropped screenshot showing the CVE-2023-22515-Scan repo by user ErikWynter (me) with 69 stars.

A cropped screenshot showing the CVE-2023-22515-Scan repo by user ErikWynter (me) with 69 stars.

Nice

08.01.2024 20:07 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GreyNoise Labs - Panic!! At the YAML An overview of SnakeYAML deserialiation vulnerabilities (CVE-2022-1471) - how it works, why it works, and what it affects

Before the break, I started looking at CVE-2022-1471 in Confluence et al, which led me learn about SnakeYAML deserialization. It was quite the ride, full of open source drama and related vulns. I wrote it all up in this blog post!

#vuln #vulnerability #poc #java #deserialization #snakeyaml #yaml

03.01.2024 20:49 πŸ‘ 4 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Pretty annoyed that it took me around 25 years to realize it's fine to pursue math just because you like it, even if you're nothing like the Good Will Hunting guy.

30.12.2023 23:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I'd really appreciate it if one of you could give me a heads up the next time I have an important school assignment due in my dreams.

28.12.2023 19:43 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Congrats to LinkedIn for killing MyNetwork notifications by including this 'Catch up' nonsense.

21.12.2023 17:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

A colleague just mentioned that he was doing a pentest for an adult website. This gave me so many ideas for stupid jokes with a pun on "penetration" testing that I had to sit down for a minute.

21.12.2023 16:58 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Screenshot of a LinkedIn notification: "You're one of a few experts invited to add to this collaborative article: What are the most effective ways to overcome impostor syndrome in programming?"

Screenshot of a LinkedIn notification: "You're one of a few experts invited to add to this collaborative article: What are the most effective ways to overcome impostor syndrome in programming?"

Oh geez, they must think I'm far more experienced and knowledgeable than I actually am...

20.12.2023 20:03 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Privesc to RCE in β€œenterprise-grade” OpenNMS An analysis of CVE-2023–0872, CVE-2023–40315 & more

Hi all! Earlier this year I found several vulnerabilities in OpenNMS, including a pretty funny privesc to RCE chain. I just published a writeup here: medium.com/@erik.wynter...
I also wrote a Metasploit module, the PR is open here: github.com/rapid7/metas...

13.12.2023 17:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Say what you will about LinkedIn, it is by far the best place to receive updates on infosec news from 3+ months ago.

08.12.2023 23:25 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
~ $ curl -v http://user:pass@scanme.nmap.org 2>&1 | head -n 20
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0*   Trying 45.33.32.156:80...
* Connected to scanme.nmap.org (45.33.32.156) port 80
* Server auth using Basic with user 'user'
> GET / HTTP/1.1
> Host: scanme.nmap.org
> Authorization: Basic dXNlcjpwYXNz
> User-Agent: curl/8.3.0
> Accept: */*
>
< HTTP/1.1 200 OK
< Date: Tue, 07 Nov 2023 20:49:12 GMT
< Server: Apache/2.4.7 (Ubuntu)
< Accept-Ranges: bytes
< Vary: Accept-Encoding
< Transfer-Encoding: chunked
< Content-Type: text/html
<
{ [1043 bytes data]
~ $

~ $ curl -v http://user:pass@scanme.nmap.org 2>&1 | head -n 20 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 45.33.32.156:80... * Connected to scanme.nmap.org (45.33.32.156) port 80 * Server auth using Basic with user 'user' > GET / HTTP/1.1 > Host: scanme.nmap.org > Authorization: Basic dXNlcjpwYXNz > User-Agent: curl/8.3.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Tue, 07 Nov 2023 20:49:12 GMT < Server: Apache/2.4.7 (Ubuntu) < Accept-Ranges: bytes < Vary: Accept-Encoding < Transfer-Encoding: chunked < Content-Type: text/html < { [1043 bytes data] ~ $

Embarrassed I didn't know this, but TIL that most browsers used to let you perform HTTP basic authentication by specifying the creds in the URL, eg: "http://username:password@example.com". cURL still supports this:

07.11.2023 21:01 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Haha yeah that's a challenge I think about regularly, of helping my kids understand and appreciate the crucial difference between things you kind of aren't supposed to do (an essential part of hacking) and things you simply shouldn't do (because they are unethical or simply too dangerous).

05.11.2023 00:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I played UNO junior today for the first time with our eldest and I have never been this happy to get absolutely destroyed. 10-1 with zero cheating. Yes, it was THAT brutal.

04.11.2023 19:58 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

The real tragedy of the commons is people using game theory concepts incorrectly.

31.10.2023 18:01 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

If you want a hit offsec post, just write "PoC for CVE-SomeMajorVuln" followed by a random cURL request. No one's going to notice on time to stop the inevitable stream of retweets.

11.10.2023 21:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Image of an indigenous woman flipping the bird and smiling. The caption reads: Fuck Christopher Columbus.

Image of an indigenous woman flipping the bird and smiling. The caption reads: Fuck Christopher Columbus.

Happy Indigenous Peoples’ Day

09.10.2023 15:29 πŸ‘ 1725 πŸ” 597 πŸ’¬ 5 πŸ“Œ 4

Hi all, I just published a Python scanner for CVE-2023-22515, the critical vulnerability in Atlassian #Confluence Server and Data Center that is actively being exploited in the wild. The scanner does NOT include an exploitation component. Get it here: github.com/ErikWynter/C...

06.10.2023 21:39 πŸ‘ 1 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Hi all, I just published a Python scanner for CVE-2023-22515, the critical vulnerability in Atlassian #Confluence Server and Data Center that is actively being exploited in the wild. The scanner does NOT include an exploitation component. Get it here: github.com/ErikWynter/C...

06.10.2023 21:39 πŸ‘ 1 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

Amazing. The only thing missing is like $500,000 to sponsor op-eds arguing that remote work is bad for people...

02.10.2023 07:35 πŸ‘ 6 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Salaries: $100
Laptops: $200
Electricity: $180
Marketing: $210
Office space: $5,000,000
Career development: $50

someone who is good at the economy please help me budget this. my company is dying.

02.10.2023 06:04 πŸ‘ 125 πŸ” 26 πŸ’¬ 7 πŸ“Œ 1

god forbid a man have hobbies

01.10.2023 16:50 πŸ‘ 136 πŸ” 26 πŸ’¬ 3 πŸ“Œ 0
Saturn Devouring His Son

Saturn Devouring His Son

This meal just cost me $78 at the Newark airport. This is why Americans think the economy is terrible.

21.09.2023 14:47 πŸ‘ 2165 πŸ” 345 πŸ’¬ 46 πŸ“Œ 19
Left Exit 12 Off Ramp meme. Left Exit 12 text: Doing legit vuln research so I can have a career. Off ramp text: Writing Fortran exploits for the lulz. Car label: me

Left Exit 12 Off Ramp meme. Left Exit 12 text: Doing legit vuln research so I can have a career. Off ramp text: Writing Fortran exploits for the lulz. Car label: me

Why am I like this

19.09.2023 22:53 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

Hey all, what would be the best platform/app for learning Python on Android? I know Android is far from ideal but it's the most feasible option for my SO rn. So far they've been using the Sololearn app, but the free version is very limiting due to the "hearts" system.

17.09.2023 21:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0