As a researcher for the Bishop Fox Capability Development team, Jon spends his time hunting for vulnerabilities and writing exploits for software on our customers' attack surface. He previously served as an organizer for BSides Connecticut for four years and most recently completed the Corelan Advanced Windows Exploit Development course. Jon has presented talks and written articles about his security research on various subjects, including enterprise wireless network attacks, bypassing network access controls, and malware reverse engineering.
What the Vuln Quarterly Roundup 2
What You Can't See CAN Hurt You: SonarQube Privilege Escalation
SSH Grabber
A More Complete Exploit for Fortinet CVE-2022-42475
Automating Exploitation of a Pulse SSL VPN Arbitrary File Read Vulnerability
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.