Comments for John Stawinski IV https://johnstawinski.com Making Hacking Accessible Tue, 06 May 2025 19:54:55 +0000 hourly 1 http://wordpress.com/ Comment on Fixing Typos and Breaching Microsoft’s Perimeter  by Black Hat and DEF CON Preview: “Grand Theft Actions” or “Continuous Integration, Continuous Destruction”? – John Stawinski IV https://johnstawinski.com/2024/04/15/fixing-typos-and-breaching-microsofts-perimeter/comment-page-1/#comment-526 Tue, 30 Jul 2024 16:35:03 +0000 http://johnstawinski.com/?p=662#comment-526 […] Fixing Typos and Breaching Microsoft’s Perimeter  […]

Like

]]>
Comment on Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch by Black Hat and DEF CON Preview: “Grand Theft Actions” or “Continuous Integration, Continuous Destruction”? – John Stawinski IV https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/comment-page-1/#comment-525 Tue, 30 Jul 2024 16:34:55 +0000 http://johnstawinski.com/?p=592#comment-525 […] from our PyTorch compromise blog post with another conference submission teaser. If you want to do some background reading, there’s a […]

Like

]]>
Comment on Worse than SolarWinds: Three Steps to  Hack Blockchains, GitHub, and ML through GitHub Actions by Black Hat and DEF CON Preview: “Grand Theft Actions” or “Continuous Integration, Continuous Destruction”? – John Stawinski IV https://johnstawinski.com/2024/01/05/worse-than-solarwinds-three-steps-to-hack-blockchains-github-and-ml-through-github-actions/comment-page-1/#comment-524 Tue, 30 Jul 2024 16:34:51 +0000 http://johnstawinski.com/?p=568#comment-524 […] written about several of our attack paths, but have saved many of the details hoping that we’d get accepted to a large conference like […]

Like

]]>
Comment on Scoring 100 Points on the New OSCP Exam: My Exam Experience by Black Hat and DEF CON Preview: “Grand Theft Actions” or “Continuous Integration, Continuous Destruction”? – John Stawinski IV https://johnstawinski.com/2022/10/09/scoring-100-points-on-the-new-oscp-exam-my-exam-experience/comment-page-1/#comment-523 Tue, 30 Jul 2024 16:34:48 +0000 http://johnstawinski.com/?p=143#comment-523 […] seems like yesterday I was sitting in the corner of my family’s gym in Essex, Vermont, trying to pass my OSCP exam so I could get my first […]

Like

]]>
Comment on Fixing Typos and Breaching Microsoft’s Perimeter  by Worse than SolarWinds: Three Steps to  Hack Blockchains, GitHub, and ML through GitHub Actions – John Stawinski IV https://johnstawinski.com/2024/04/15/fixing-typos-and-breaching-microsofts-perimeter/comment-page-1/#comment-522 Sun, 21 Jul 2024 04:56:00 +0000 http://johnstawinski.com/?p=662#comment-522 […] Gaining remote code execution on a domain-joined Microsoft machine by exploiting Microsoft Deepspeed (update – walkthrough now available in Fixing Typos and Breaching Microsoft’s Perimeter ) […]

Like

]]>
Comment on Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch by Fixing Typos and Breaching Microsoft’s Perimeter  – John Stawinski IV https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/comment-page-1/#comment-517 Mon, 15 Apr 2024 16:28:26 +0000 http://johnstawinski.com/?p=592#comment-517 […] of our other attacks, like our attack on PyTorch, required implantation, reconnaissance, crazy token pivots, and secret stealing to prove impact. […]

Like

]]>
Comment on Worse than SolarWinds: Three Steps to  Hack Blockchains, GitHub, and ML through GitHub Actions by Fixing Typos and Breaching Microsoft’s Perimeter  – John Stawinski IV https://johnstawinski.com/2024/01/05/worse-than-solarwinds-three-steps-to-hack-blockchains-github-and-ml-through-github-actions/comment-page-1/#comment-516 Mon, 15 Apr 2024 16:28:23 +0000 http://johnstawinski.com/?p=568#comment-516 […] you’ve been following the research we’ve released so far, you probably suspect that the Microsoft DeepSpeed repository uses self-hosted runners. You’re […]

Like

]]>
Comment on Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch by TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/comment-page-1/#comment-504 Thu, 18 Jan 2024 13:42:00 +0000 http://johnstawinski.com/?p=592#comment-504 […] public GitHub repositories, including those associated with Chia Networks, Microsoft DeepSpeed, and PyTorch, are susceptible to malicious code injection via self-hosted GitHub Actions […]

Like

]]>
Comment on Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch by A "Critical Supply Chain Attack" on the PyTorch Infrastructure Raises Concerns — and a Bug Bounty - The Star News Today https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/comment-page-1/#comment-499 Thu, 18 Jan 2024 01:14:07 +0000 http://johnstawinski.com/?p=592#comment-499 […] Stawinski’s full write-up is available on his website. […]

Like

]]>
Comment on Playing with Fire – How We Executed a Critical Supply Chain Attack on PyTorch by New Class of CI/CD Attacks Could Have Led to PyTorch Supply Chain Compromise – Cyber Social Hub https://johnstawinski.com/2024/01/11/playing-with-fire-how-we-executed-a-critical-supply-chain-attack-on-pytorch/comment-page-1/#comment-481 Fri, 12 Jan 2024 13:02:19 +0000 http://johnstawinski.com/?p=592#comment-481 […] machine learning (ML) framework PyTorch, Stawinski explains, was one of their first targets, given its popularity. The child of Meta AI and now part of the […]

Like

]]>