As a researcher for the Bishop Fox Capability Development team, Jon spends his time hunting for vulnerabilities and writing exploits for software on our customers' attack surface. He previously served as an organizer for BSides Connecticut for four years and most recently completed the Corelan Advanced Windows Exploit Development course. Jon has presented talks and written articles about his security research on various subjects, including enterprise wireless network attacks, bypassing network access controls, and malware reverse engineering.
What the Vuln Quarterly Roundup 2
What You Can't See CAN Hurt You: SonarQube Privilege Escalation
SSH Grabber
A More Complete Exploit for Fortinet CVE-2022-42475
Automating Exploitation of a Pulse SSL VPN Arbitrary File Read Vulnerability
Jan 15, 2024
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable
Aug 02, 2023
Breaking Fortinet Firmware Encryption
Jul 21, 2023
Citrix ADC Gateway RCE: CVE-2023-3519 is Exploitable, and 53% of Servers Are Unpatched
May 17, 2023
A More Complete Exploit for Fortinet CVE-2022-42475
Sep 12, 2019
Breaching the Trusted Perimeter | Automating Exploitation
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.