Sam Curry

Sam Curry (born October 17, 1999) is an American bug bounty hunter, and founder. He is best known for his contributions to web application security through participation in bug bounty programs, most notably finding a security vulnerability in Tesla after cracking his windshield.[1] Curry began working as a security consultant through his company 17security[2] in 2018, and is currently a student at the University of Nebraska Omaha.[3]

Sam Curry
Born (1999-10-17) October 17, 1999
NationalityAmerican
Occupation(s)bug hunter, Security Researcher

Curry has spoken on ethical hacking, web application security, and vulnerability disclosure at conferences including DEFCON,[4] Black Hat Briefings,[5] Kernelcon,[6] and null.[7] 2019, Curry identified a critical security vulnerability affecting various Jira products.[8]

Biography

Curry grew up in Omaha, Nebraska and attended Elkhorn High School. He began hacking at the age of 12,[9] ethically disclosing vulnerabilities to various vendors over email.[10] At University of Nebraska Omaha, Curry works with students through the cyber security club NULLify.[11][12]

Publications and articles

  • "Researchers Secure Bug Bounty Payout to Help Raise Funds for Infant’s Surgery". vice.com. Retrieved June 2, 2021.[13]
  • "Pega Infinity hotfix released after researchers flag critical authentication bypass vulnerability" portswigger.net. Retrieved June 2, 2021.[14]
  • "We Hacked Apple for 3 Months: Here’s What We Found". samcurry.net. Retrieved April 9, 2021.[15]
  • "Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty". samcurry.net. Retrieved November 3, 2019.[16]

References

  1. Tung, Liam. "Huge rock, cracked windshield helps hacker land a $10k Tesla security bug". CSO Online. Retrieved 24 March 2020.
  2. Ganz, Amy (30 July 2018). "Teen makes six figures hacking Google, Facebook legally". Fox Business. Retrieved 24 March 2020.
  3. Drake, Diana (30 January 2019). "The World of the White Hat Hacker". The Wharton School. Retrieved 24 March 2020.
  4. "THE TALKS THAT DEFINE DEF CON 27". Bugcrowd. 5 August 2019. Retrieved 24 March 2020.
  5. Murphy, Margi (10 August 2019). "Inside Black Hat, the world's biggest ethical hacker conference in Las Vegas". Telegraph. Retrieved 24 March 2020.
  6. Vidas, Tim. "Kernelcon Speakers". Kernelcon. Retrieved 24 March 2020.
  7. "null Dubai Meet 16 March 2023 March Special Meet". null.community. Retrieved 2023-03-24.
  8. Dunn, John (24 September 2019). "Jira development and ticketing software hit by critical flaws". CSO Online. Retrieved 24 March 2020.
  9. Haworth, Jessica (23 April 2019). "School's out: Meet the teen hackers swapping books for bugs". Portswigger. Retrieved 24 March 2020.
  10. Paul, Kari. "This 18-year-old's hacking side hustle has earned him $100,000—and it's totally legal". MarketWatch. Retrieved 24 March 2020.
  11. Denney, Vanessa (18 December 2018). "NULLify Capture The Flag". University of Nebraska Omaha. Retrieved 24 March 2020.
  12. "Globally Used Points.com Loyalty System Hacked for Good". www.hackread.com. 4 August 2023.
  13. Franceschi-Bicchierai, Lorenzo. "Researchers Secure Bug Bounty Payout to Help Raise Funds for Infant's Surgery". vice.com. Retrieved 2 June 2021.
  14. Pritchard, Stephen (10 May 2021). "Pega Infinity hotfix released after researchers flag critical authentication bypass vulnerability". portswigger.net. Retrieved 2 June 2021.
  15. Curry, Samuel. "We Hacked Apple for 3 Months: Here's What We Found". samcurry.net. Retrieved 3 November 2019.
  16. Curry, Samuel (November 2019). "Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty". samcurry.net. Retrieved 3 November 2019.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.