<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ancorn_ | Ngô Thiên An</title>
    <link>https://ngothienan.github.io/</link>
    <description>Recent content on ancorn_ | Ngô Thiên An</description>
    <image>
      <title>ancorn_ | Ngô Thiên An</title>
      <url>https://pbs.twimg.com/profile_images/1634910718846963717/RJTIDn4s_400x400.jpg</url>
      <link>https://pbs.twimg.com/profile_images/1634910718846963717/RJTIDn4s_400x400.jpg</link>
    </image>
    <generator>Hugo -- 0.156.0</generator>
    <language>en</language>
    <lastBuildDate>Thu, 05 Mar 2026 00:24:25 +0700</lastBuildDate>
    <atom:link href="https://ngothienan.github.io/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>AI-Driven Code Analysis: The Future of Whitebox Security Testing</title>
      <link>https://ngothienan.github.io/posts/ai-driven-code-analysis---the-future-of-whitebox-security-testing/</link>
      <pubDate>Thu, 05 Mar 2026 00:24:25 +0700</pubDate>
      <guid>https://ngothienan.github.io/posts/ai-driven-code-analysis---the-future-of-whitebox-security-testing/</guid>
      <description>&lt;h2 id=&#34;icymi-in-case-you-missed-it&#34;&gt;ICYMI (In Case You Missed It)&lt;/h2&gt;
&lt;p&gt;Let&amp;rsquo;s be real—whitebox pentesting involves &lt;em&gt;a lot&lt;/em&gt; of tedious, repetitive steps. From reading and wrapping your head around the context, digging through the logic, hunting for bugs, exploiting them, to the absolute drag of writing reports&amp;hellip; it&amp;rsquo;s a grind. But guess what? AI can now totally carry us through almost all of these phases! In this post, I&amp;rsquo;m going to flex &lt;strong&gt;Antigravity&lt;/strong&gt; along with its full arsenal of skills and rules to pull off a buttery smooth whitebox pentest.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[POC] CVE-2024-24842 - Unauthenticated PHP Object Injection in plugin Knowledge Base - Wordpress</title>
      <link>https://ngothienan.github.io/posts/poc--cve-2024-24842---unauthenticated-php-object-injection-in-plugin-knowledge-base/</link>
      <pubDate>Mon, 19 Feb 2024 21:24:25 +0700</pubDate>
      <guid>https://ngothienan.github.io/posts/poc--cve-2024-24842---unauthenticated-php-object-injection-in-plugin-knowledge-base/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/echo-knowledge-base/knowledge-base-for-documentation-faqs-with-ai-assistance-11302-unauthenticated-php-object-injection-in-is-article-recently-viewed&#34;&gt;Knowledge Base for Documentation, FAQs with AI Assistance plugin - Unauthenticated PHP Object Injection&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;-table-of-content&#34;&gt;✋ Table of content&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;About Knowledge Base for Documentation, FAQs with AI Assistance plugin&lt;/li&gt;
&lt;li&gt;The security vulnerability&lt;/li&gt;
&lt;li&gt;The patch&lt;/li&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This blog post is about the &lt;strong&gt;Knowledge Base for Documentation, FAQs with AI Assistance&lt;/strong&gt; plugin vulnerability. If you&amp;rsquo;re using this plugin, please update the plugin to at least version &lt;strong&gt;11.31.0&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id=&#34;about-knowledge-base-for-documentation-faqs-with-ai-assistance-plugin&#34;&gt;About Knowledge Base for Documentation, FAQs with AI Assistance plugin&lt;/h2&gt;
&lt;p&gt;The plugin &lt;strong&gt;Knowledge Base for Documentation, FAQs with AI Assistance&lt;/strong&gt;  (versions 11.30.2 and below), which is estimated to have over 10,000 active installations.&lt;/p&gt;</description>
    </item>
    <item>
      <title>[POC] CVE-2020-7769 - Command Injection in nodemailer</title>
      <link>https://ngothienan.github.io/posts/poc-cve-2020-7769---command-injection-in-nodemailer/</link>
      <pubDate>Sun, 03 Sep 2023 21:24:25 +0700</pubDate>
      <guid>https://ngothienan.github.io/posts/poc-cve-2020-7769---command-injection-in-nodemailer/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;&lt;a href=&#34;https://security.snyk.io/vuln/SNYK-JS-NODEMAILER-1038834&#34;&gt;Command Injection in nodemailer&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Someday, i read some product code and found out that application using nodemailer to send email. After spending some second to audit &lt;strong&gt;package-lock&lt;/strong&gt; file, i saw it had this CVE.&lt;/p&gt;
&lt;p&gt;But i read that details and their POC, i still not understand what they want to deliver.&lt;/p&gt;
&lt;p&gt;Found their commit to fix their bug and already know where the bug from
&lt;a href=&#34;https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54&#34;&gt;https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It comes from &lt;strong&gt;send&lt;/strong&gt; function, with arbitrary command flag injection in &lt;strong&gt;sendmail&lt;/strong&gt; transport.
&lt;img loading=&#34;lazy&#34; src=&#34;https://ngothienan.github.io/CVE-2020-7769/1.png&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>About ancorn_</title>
      <link>https://ngothienan.github.io/about/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://ngothienan.github.io/about/</guid>
      <description>&lt;h1 id=&#34;hey-im-ngô-thiên-an-or-you-can-call-me-ancorn_-&#34;&gt;Hey, I’m Ngô Thiên An or you can call me ancorn_ 👋&lt;/h1&gt;
&lt;p&gt;OSWE-certified &lt;strong&gt;Penetration Testing Expert&lt;/strong&gt;, &lt;strong&gt;Security Researcher&lt;/strong&gt;, and Bug Bounty Hunter chilling in Da Nang, Vietnam.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;In breaking things, we learn how they work.&amp;rdquo;
— my mindset in the wild world of cyber&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h3 id=&#34;what-i-do&#34;&gt;What I Do&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Penetration Tester&lt;/strong&gt; @ VNPT-VCI&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security Researcher&lt;/strong&gt; @ Synack Red Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Software Engineer&lt;/strong&gt; @ Chative&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;certs--badges&#34;&gt;Certs &amp;amp; Badges&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://credentials.offsec.com/48359340-2060-40ef-9153-e08f66868dc2&#34;&gt;OffSec Web Expert (OSWE)&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href=&#34;https://www.coursera.org/account/accomplishments/specialization/certificate/UXG4DSQXMFBD&#34;&gt;Google Project Management&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;wins--brags&#34;&gt;Wins &amp;amp; Brags&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://acropolis.synack.com/inductees/ancorn_&#34;&gt;Synack - Acropolis&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://support.apple.com/en-vn/122162&#34;&gt;Apple - Hall Of Fame&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://patchstack.com/database/leaderboard/all&#34;&gt;Patchstack - Wordpress Bug Bounty Program&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/researchers/ngo-thien-an-ancorn&#34;&gt;Wordfence - Wordpress Bug Bounty Program&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;my-cves&#34;&gt;My CVEs:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-simple-registration/simple-registration-for-woocommerce-156-unauthenticated-privilege-escalation&#34;&gt;CVE-2024-32511 (9.8)&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/echo-knowledge-base/knowledge-base-for-documentation-faqs-with-ai-assistance-11302-unauthenticated-php-object-injection-in-is-article-recently-viewed&#34;&gt;CVE-2024-24842 (9.8)&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/s2member/s2member-240315-limited-privilege-escalation&#34;&gt;CVE-2024-31237 (9.1)&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.wordfence.com/threat-intel/vulnerabilities/researchers/ngo-thien-an-ancorn?sortby=cvss_score&amp;amp;sort=desc#jump&#34;&gt;240 CVE+&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;news--posts&#34;&gt;News &amp;amp; Posts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.facebook.com/vnptcyberimmunity/posts/pfbid02G2TLGAMouTZ9D6b79g8KEzmyr5iEPDos4zJBXbykSt73NFchUT1HBwCg65grBgYol&#34;&gt;VNPT - Nói về Ngô Thiên An&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://daihoc.fpt.edu.vn/chua-phan-loai/nam-sinh-dh-fpt-kiem-vai-nghin-usd-moi-thang-tu-nhung-cuoc-san-lo-hong-bao-mat/&#34;&gt;FPT University - Nam sinh ĐH FPT kiếm vài nghìn USD mỗi tháng từ những “cuộc săn” lỗ hổng bảo mật&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://cafef.vn/nam-sinh-dh-fpt-kiem-vai-nghin-usd-moi-thang-tu-nhung-cuoc-san-lo-hong-bao-mat-188240527201839792.chn&#34;&gt;CafeF - Nam sinh ĐH FPT kiếm vài nghìn USD mỗi tháng từ những “cuộc săn” lỗ hổng bảo mật&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://www.facebook.com/Theanh28/posts/%C4%91%C3%A2y-l%C3%A0-ng%C3%B4-thi%C3%AAn-an-ng%C6%B0%E1%BB%9Di-sau-khi-%C4%91%C6%B0%E1%BB%A3c-wordfence-c%E1%BA%A5p-m%C3%A3-cve-2023-4308-%E1%BB%9F-c%E1%BA%A5p%C4%91%E1%BB%99-hi/769192032062568/&#34;&gt;TheAnh28 - Ngô Thiên An&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://chative.io/blog/release-1-3-2-inbox-improvements-and-better-app-security/&#34;&gt;Chative - Better App Security&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;a href=&#34;https://chative.io/blog/release-1-6-take-control-with-custom-permissions/&#34;&gt;Chative - App Security&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;my-hobbies&#34;&gt;My hobbies:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;📈 Exploring Economics, Financial Markets, and Real Estate.&lt;/li&gt;
&lt;li&gt;🈯 Learning basic Chinese.&lt;/li&gt;
&lt;li&gt;🍈 Enjoying Durian (the ultimate fruit!).&lt;/li&gt;
&lt;li&gt;🤖 Tinkering with AI agents and LLMs.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;I learn by &lt;strong&gt;finding problems and breaking them&lt;/strong&gt; — that’s why I love cybersecurity.
This blog? My playground for &lt;strong&gt;pentest tips&lt;/strong&gt;, &lt;strong&gt;bug bounty stories&lt;/strong&gt;, and random cyber rants.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
