โถ๏ธ Now Playing: Telecom Sleeper Cells, SD-WAN Bypasses, & LLM Bug Bounties.
In Episode 2 of Hacktics and Telemetry, Douglas McKee & @cryptocat.me continue to bring you the latest in cybersecurity news, vuln research, and actionable defensive strategies: https://r-7.co/4sTbDu5
Posts by CryptoCat
My writeup for the "Secret Manager" challenge by zerodaygym (@yeswehack.bsky.social) ๐คซ
cryptocat.me/blog/ctf/mon...
โ๐บโ
Happy St Patrick's day โ
๐ค๐พ Introducing Hacktics and Telemetry, a bi-weekly video and audio podcast out of Rapid7 Labs, starring Rapid7's Doug McKee (fulmetalpackets) & Jonah Burgess (@cryptocat.me)!
๐งต Find episode 1's companion blog here: r-7.co/4di8tuH
โถ๏ธ Or dive right into the full vid on YouTube: r-7.co/3NiQfP2
๐จ CVE-2026-20127: Cisco SD-WAN authentication bypass. An unauthenticated attacker can inject SSH keys without crypto verification via a flawed state machine. Active exploitation by UAT-8616 since 2023 ๐
Check out the full @rapid7.com analysis ๐
attackerkb.com/topics/bP3FM...
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris.
Their zero-click exploits went to Russian spies too.
Unbelievable harm to our collective security.
Scoop: @lorenzofb.bsky.social, here's why it matters 1/
techcrunch.com/2026/03/09/a...
"For the first time since we began tracking zero-day exploitation, we attributed more zero-days to commercial surveillance vendors than to traditional state-sponsored cyber espionage groups."
Love to see the stats backing up my hunch.
cloud.google.com/blog/topics/...
CVE-2026-1731 Metasploit module demo
My first @metasploit-r7.bsky.social module is live! You can now exploit CVE-2026-1731 (BeyondTrust command injection) with the latest version ๐
๐จ In conducting 0 day research against #Grandstream GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329.
The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on: r-7.co/4tIzope
My writeup for the "RubitMQ" challenge by @yeswehack.bsky.social ๐
cryptocat.me/blog/ctf/mon...
#ctf #capturetheflag #bugbounty #ethicalhacking #cybersecurity #infosec #yeswehack
The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted! portswigger.net/research/top...
CryptoCat x Rapid7 ๐งก
Couldn't be more excited to announce I'm joining the vulnerability research team at @rapid7.com next week! ๐ฅณ
Really looking forward to teaming up with some seriously talented researchers and digging into real-world threats and vulnerabilities. Stay tuned ๐
My writeup for the "APICrash" challenge from @yeswehack.bsky.social ๐ฅ
cryptocat.me/blog/ctf/mon...
At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality. @evystadium.bsky.social has more.
Full story by @josephcox.bsky.social: www.404media.co/dhs-is-lying...
Happy new year!! ๐ฅณ๐
I'm already glad I did this, but honestly I would have been happy to leave my content on Gitbook.
The problem was that Google refused to index a single page in the 1+ year since I connected my own [sub]domain to Gitbook.
Up until then, indexing worked without any issues ๐ซ
New blog live @ https://cryptocat.me/blog/ ๐
I've been working hard to move my written content from gitbook over to my own website ๐ทโโ๏ธ
It's still a work in progress, but I'm pretty happy with the results so far ๐
๐ cryptocat.me/blog/
Hacky Christmas ๐
Wishing a very hacky christmas to all the hacker fam! ๐
Video walkthrough for the Hacky Christmas challenge I made for #NahamCon2025 ๐
youtu.be/fs9WeNkUB4M
Hacky Christmas Challenge [gamepwn]
The #NahamCon2025 CTF is over โ
Writeups for my challs ๐
๐ฎ Hacky Christmas โก book.cryptocat.me/blog/ctf/202...
๐ฅ VulnBank โก book.cryptocat.me/blog/ctf/202...
๐ฅ Snorex 2K CCTV โก book.cryptocat.me/blog/ctf/202...
Stay tuned for a video walkthrough of Hacky Christmas ๐
๐
I made a couple of [easy-med] challenges for #NahamCon2025 - you've got 24 hours! ๐
๐ฎ ctf.nahamcon.com/hubs/hacky-c...
๐ฅ ctf.nahamcon.com/hubs/vuln-bank
๐ฅ ctf.nahamcon.com/hubs/snorex-...
Here's a sneak peek at Hacky Christmas ๐
Can you escape the ice box and take out 1 MILLION gingerbread men? ๐
I also made some challenges for #NahamCon2025, hope you will check them out! ๐
Awww thank you! For now you'll have to find me at a hacking con ๐ Next time I run a CTF challenge, I'll send some out as prizes too ๐
๐โจ๏ธ
New stickers ๐ผ
New video covering the solution to the Mother Printers challenge I created for @hackinghub.bsky.social ๐
Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn ๐
youtu.be/ebNYtX_8lOY
You can still play the challenge for free! app.hackinghub.io/hubs/mother-...