Sam Curry
Born (1999-10-17) October 17, 1999
NationalityAmerican
Occupation(s)Hacker, Security Researcher

Sam Curry (born October 17, 1999) is an American ethical hacker, bug bounty hunter, and founder. He is best known for his contributions to web application security through participation in bug bounty programs, most notably finding critical vulnerabilities in 20 different auto manufacturers including Porsche, Mercedes-Benz, Ferrari, and Toyota. In 2018, Curry began working as a security consultant through his company Palisade[1] where he disclosed vulnerability publications for security findings in Apple, Starbucks, Jira, and Tesla.

In 2021, Palisade was acquired by Yuga Labs where Curry currently works as a security engineer. In 2023, Curry was detained and summoned to testify within a Grand Jury by the IRS-CI and DHS on wrongful suspicion of running a high-profile phishing website.

Curry has spoken on ethical hacking, web application security, and vulnerability disclosure at conferences including DEFCON,[2] Black Hat Briefings,[3] Kernelcon,[4] and null.[5]

Biography

Curry grew up in Omaha, Nebraska and attended Elkhorn High School. He began hacking at the age of 12,[6] ethically disclosing vulnerabilities to various vendors over email.[7] At University of Nebraska Omaha, Curry worked with students through the cyber security club NULLify.[8][9]

Publications and articles

  • "Researchers Secure Bug Bounty Payout to Help Raise Funds for Infant’s Surgery". vice.com. Retrieved June 2, 2021.[10]
  • "Pega Infinity hotfix released after researchers flag critical authentication bypass vulnerability" portswigger.net. Retrieved June 2, 2021.[11]
  • "We Hacked Apple for 3 Months: Here’s What We Found". samcurry.net. Retrieved April 9, 2021.[12]
  • "Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty". samcurry.net. Retrieved November 3, 2019.[13]
  • "Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More". samcurry.net. Retrieved November 26, 2023. [14]

References

  1. Ganz, Amy (30 July 2018). "Teen makes six figures hacking Google, Facebook legally". Fox Business. Retrieved 24 March 2020.
  2. "THE TALKS THAT DEFINE DEF CON 27". Bugcrowd. 5 August 2019. Retrieved 24 March 2020.
  3. Murphy, Margi (10 August 2019). "Inside Black Hat, the world's biggest ethical hacker conference in Las Vegas". Telegraph. Retrieved 24 March 2020.
  4. Vidas, Tim. "Kernelcon Speakers". Kernelcon. Retrieved 24 March 2020.
  5. "null Dubai Meet 16 March 2023 March Special Meet". null.community. Retrieved 2023-03-24.
  6. Haworth, Jessica (23 April 2019). "School's out: Meet the teen hackers swapping books for bugs". Portswigger. Retrieved 24 March 2020.
  7. Paul, Kari. "This 18-year-old's hacking side hustle has earned him $100,000—and it's totally legal". MarketWatch. Retrieved 24 March 2020.
  8. Denney, Vanessa (18 December 2018). "NULLify Capture The Flag". University of Nebraska Omaha. Retrieved 24 March 2020.
  9. "Globally Used Points.com Loyalty System Hacked for Good". www.hackread.com. 4 August 2023.
  10. Franceschi-Bicchierai, Lorenzo. "Researchers Secure Bug Bounty Payout to Help Raise Funds for Infant's Surgery". vice.com. Retrieved 2 June 2021.
  11. Pritchard, Stephen (10 May 2021). "Pega Infinity hotfix released after researchers flag critical authentication bypass vulnerability". portswigger.net. Retrieved 2 June 2021.
  12. Curry, Samuel. "We Hacked Apple for 3 Months: Here's What We Found". samcurry.net. Retrieved 3 November 2019.
  13. Curry, Samuel (November 2019). "Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty". samcurry.net. Retrieved 3 November 2019.
  14. Curry, Samuel (November 2019). "Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More". samcurry.net. Retrieved 3 November 2019.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.