I like to make, break, and fix things to see how they work inside out.

Some of my free time is spent writing code, reversing, researching malware, or participating in CTFs. A subset of my past findings have CVE identifiers:

  • CVE-2016-5563: Unauthenticated and Privileged RCE in Oracle OPERA
  • CVE-2016-5564: Exposure of Oracle SQL Database Credentials in Oracle OPERA
  • CVE-2016-5565: Session Hijacking via Exposed Logs in Oracle OPERA
  • CVE-2017-3762: Insecure OS Credentials Storage in Lenovo Fingerprint Manager
  • CVE-2018-11228: Unauthenticated RCE via Bash Shell Service in Crestron TSW-X60
  • CVE-2018-11229: Unauthenticated RCE via Command Injection in Crestron TSW-X60
  • CVE-2018-13341: Elevation of Privilege in Crestron Terminal Protocol
  • CVE-2019-8372: Local Privilege Elevation in LG Device Manager Driver
  • CVE-2019-9730: Local Privilege Elevation in Synaptics Sound Device Driver
  • CVE-2019-10724: Dolby DAX2 API Denial of Service (Arbitrary Process Termination)

Here's a list of the public InfoSec-related projects I'm working on:

  • dirt: Vulnerability research initial assessment tool for Windows drivers
  • ioctlpus: Front-end for DeviceIoControl requests for Windows drivers
  • vria: Scalable initial assessment of binaries for vulnerability research
  • wrecc: Windows Reverse Engineering Crash Course
  • belch: Minimalist native desktop front-end for mitmproxy

Outside of work-related interests, I try to stay updated on emerging technologies (e.g. space exploration and AI) to the extent I can practically understand them. I also like to consume anything that reminds me of The Twilight Zone, read science fiction, and spend time with friends and family.

The views expressed here are mine alone and are not necessarily representative of the views of my employers. The information contained within this website is supplied "as-is" with no warranties or guarantees of use or otherwise. I accept no responsibility for any damage caused by the use or misuse of such information.