Valentin Lobstein

Chocapikk

Security Engineer & Exploit Developer

Breaking, building, and documenting. Vulnerability research, exploit development, and offensive security engineering at LeakIX.

CV
48 cves 80 exploits 87 plugins 42 articles

Latest

How Internet Scanners Actually Work: The 'Passive' Scanning Myth

How Internet Scanners Actually Work: The 'Passive' Scanning Myth

A deep dive into how internet-wide scanners like Shodan, Censys, and nmap actually identify services. Spoiler: there's nothing passive about it.

Read more →

Recent

all →
From Zero to Shell: Hunting Critical Vulnerabilities in AVideo

From Zero to Shell: Hunting Critical Vulnerabilities in AVideo

A comprehensive security audit of AVideo revealing 10 vulnerabilities including a critical unauthenticated RCE that chains cryptographic weaknesses, predictable salt bruteforce, and an eval() vulnerability to achieve complete server compromise in under 10 seconds.

CVERCE
Streama Path Traversal + SSRF: Chaining Vulnerabilities for Arbitrary File Write

Streama Path Traversal + SSRF: Chaining Vulnerabilities for Arbitrary File Write

A critical vulnerability in Streama allows authenticated users to write arbitrary files through a combination of Server-Side Request Forgery (SSRF) and Path Traversal. This write-up covers the root cause analysis, exploitation flow, and the vendor's comprehensive fix.

CVERCEPath Traversal
>_

Setting Up Giscus: An Ad-Free Alternative to Disqus for Blog Comments

How I set up Giscus for ad-free blog comments using GitHub Discussions, avoiding Disqus due to ads and other concerns.

BlogTutorial
When a Wi-Fi SSID Gives You Root on an MT02 Repeater – Part 2

When a Wi-Fi SSID Gives You Root on an MT02 Repeater – Part 2

Deep dive into bind‐shell deployment, payload experiments, and a new ‘time_conf’ primitive for stealthy, persistent root access without reboot or UI lockup.

IoT
When a Wi-Fi SSID Gives You Root on an MT02 Repeater

When a Wi-Fi SSID Gives You Root on an MT02 Repeater

How a €5 MT02 Wi-Fi repeater let me pop a root shell with nothing more than a cheeky SSID.

IoT
Multiple Vulnerabilities in Xorcom CompletePBX 5.2.35: RCE, File Disclosure and XSS

Multiple Vulnerabilities in Xorcom CompletePBX 5.2.35: RCE, File Disclosure and XSS

Several critical vulnerabilities discovered in Xorcom CompletePBX 5.2.35, including authenticated file disclosure, remote command execution as root, file deletion, and reflected XSS. This write-up details the black-box methodology, PoCs, and patch timeline.

CVE
Rick Astley

NEVER GONNA
GIVE YOU UP

You were warned.