Alex Chapman

Vulnerability Researcher and Bug Bounty Hunter

2024-11-04

2024 YTD #BugBounty stats update, Week 44:

πŸ“„ 74 issues Reported (51 Crit, 12 High, 10 Medium, 1 Low)
πŸ’° 50 issues Paid
🟀 7 Duplicate
βšͺ 3 Informational
πŸ”΄ 9 OOS

Spent a good deal of time crafting a new Chrome renderer exploit last week, which I'm hoping will pay off soon 😁

πŸ’΅ average bounty change from Week 43: πŸ”½

πŸ’΅πŸŽ― November: Not met
πŸ’΅πŸŽ― 2024: Met πŸ”₯πŸ”₯πŸ”₯
πŸ’΅πŸŽ― 2024 stretch: Met πŸ”₯πŸ”₯πŸ”₯

πŸ§‘β€πŸ’» 38 Collabs
πŸͺ² 51 Programs
⏰ 57 Days oldest unpaid report

2024-03-04

2024 YTD #BugBounty stats update, Week 9:

πŸ“„ 19 issues reported (13 crit, 3 high, 3 medium)
πŸ’° 15 issues Paid
🟀 2 Duplicate
βšͺ 1 Informational
πŸ”΄ 1 OOS

Big bounty week last week πŸ’°πŸ’΅πŸͺ™

x.com/ajxchapman/status/176210

2023-01-03

@nathan Hell no lol

Alex Chapman boosted:
Katie Paxton-Fear (InsiderPhD)insiderphd@infosec.exchange
2022-12-28

Things I am surprised haven’t entered the bug bounty community:
- Mixer vs Twitch like exclusivity contracts for hackers, platforms could offer better invites, a % on top of all bounties and various other perks for x hours minimum spent hacking on the platform

2022-12-27

Nothing quite says "we really value your contribution" than an automated message, on Christmas day, on a 6 month old #BugBounty report, saying "we really value your contribution"... but still haven't got around to working on your report.

Glad to be here here making a difference in the world!

2022-12-12
2022-12-07

@bayo Thanks, I was looking for something like this!

2022-12-07

Since when did Chrome start hiding the minor, build and patch version numbers? They are masked from both JavaScript and the HTTP User-Agent πŸ€”β€‹

2022-12-07
Alex Chapman boosted:
Katie Paxton-Fear (InsiderPhD)insiderphd@infosec.exchange
2022-12-05

I am going to be at Black Hat EU with @Bugcrowd@twitter.com check out their booth 307 and come say hi! I’m going to be chatting about some of my favourite bug stories and how I approach hacking πŸ‘Œ

2022-12-05

@michenriksen I definitely don't need a LLM to question my own sanity πŸ˜†β€‹

2022-12-05

Every time I look at writing another exploit for Chrome there is a new exploit mitigation to contend with. This is excellent work from the Chrome team, but an absolute pain for the likes of me!

Last time it was WASM memory protection keys, today Sandboxed V8 pointers... what ever next???

2022-12-01

@anant yeah, this sort of auditing was part of the reason I was investigating runc.

2022-12-01

I created a container image that prints the runc version in use. Why is this useful? I have no idea, but it was pretty fun working it out.

Code at github.com/ajxchapman/runc-ver
#Docker #Kuberntes

3955e3f9cecb:/# docker run --rm runc_version | jq
{
  "runc": "1.1.4",
  "commit": "v1.1.4-0-g5fd4c4d1",
  "spec": "1.0.2-dev",
  "go": "go1.17.10",
  "libseccomp": "2.5.4",
  "__ignore": "[ PID ]"
}
2022-11-30

Managed to DoS myself playing with containers, again πŸ€¦β€β™‚οΈβ€‹ Now I'm going to have to spend the rest of the day trying to work out what on earth I managed to do...

Alex Chapman boosted:
Glenn Pegden :donor:glennpegden@infosec.exchange
2022-11-29

After almost six years years doing some kick-ass Vulnerability Management work, it's time to spread both the knowledge and the workload, so come and work with and learn from, me!

Listed as Leeds (UK), but remote in UK, Ireland, Portugal or Romania could all work.

careers.flutteruki.com/jobs/r0

Boost are very welcome!

2022-11-25

"If the container is stated with the option --pid=host, and the SYS_PTRACE and SYS_ADMIN capabilities are granted to the container... and an AppArmor profile is configured with either allow ptrace() or Unconfined... you can escape the container"

I mean... yes, but I think you have other problems if you ended up with this configuration.

Alex Chapman boosted:
2022-11-24

As promised: Here's the first $10,000 Intel bug (aka CVE-2022-33942) that allows to bypass the authentication of Intel's DCM by spoofing Kerberos and LDAP responses.

Exploit inside, enjoy πŸ˜Žβ€‹

rcesecurity.com/2022/11/from-z

#BugBounty #security

2022-11-22

One of the more difficult challenges of hunting for bugs in CI/CD environments is working out if code execution is a feature or a bug πŸ˜‘β€‹

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst