Talkspace threatened to sue a security researcher over a bug report: TechCrunch
John noted a Business Logic Flaw in May of 2020 that allowed premium Talkspace Therapy Subscriptions to be acquired, for free. Upon reporting and evaluation of the situation, he was served a Cease and Desist letter.
It was discovered that incorrect server settings on the Twitter Developer portal led to browsers caching API keys, account access token and secret. John's perspective on the caching vulnerability was featured in the article.
John never thought he would have a career sitting at a computer, let alone in cybersecurity. We walk through John's journey from being a Petroleum Engineer in the United States Marine Corps to eventually working in application security, penetration testing, security research and bug bounties.
John was requested by Hacking Is NOT a Crime to present his experience disclosing a vulnerability to Talkspace for the HackerStories Video Series. He described his experiences during public disclosure, and some of the challenges that he had faced. John gives the viewers perspective into some of the issues that Security Researchers regularly have to mitigate.
An invitation was extended to John to speak in-front of the Georgetown, TX chapter of OWASP. He discussed some of the issues that occur in Bug Bounty Program Management and talked about the book that he is releasing with Wiley.
John was invited to be an Advocate for HINAC after publicly addressing concerns with a major media outlet allowing a journalist to use the word "hacker" to describe cyber-crime. Hacking is NOT a Crime is a non-profit organization seeking to raise awareness about the pejorative use of the terms "hacker" and "hacking" throughout the media and popular culture. Specifically, the negative connotation in which the terms are so often associated. Hackers are often vilified and portrayed as evil, menacing, and even threatening individuals.
Top Ten: CyberUp NCSAM CTF Hacking Competition, 2019
8th place out of 59 teams
Challenges addressed a wide range of topics including:
Exploitation, Reverse Engineering, Cryptography, Stenography, Forensics, Memory Analysis, Registry Analysis, Password Cracking
In October of 2012, John successfully graduated Marine Corps Recruit Training at MCRD Parris Island, with his platoon: 2nd Battalion, Hotel Company, Platoon 2085. He earned the title of "United States Marine" after three long months of rigorous training.
CVE-2020-27388: YOURLS 1.5 - 1.7.10, Multiple Stored Cross Site Scripting (XSS) Vulnerabilities in Admin Panel
John worked with multiple people on a research project that resulted in several stored XSS vulnerabilities. After disclosing the vulnerability to the YOURLs team for a fix, and the CVE request process through MITRE, the Official CVE was published.
During standard Bug Bounty Hunting, John discovered that a malicious hacker was abusing 13 separate companies. He managed to gather evidence and report the threat actor, foiling the Cyber Criminal's attempt to continuously abuse these companies.