Linux kernel debugging. Wireless security research. Finding bugs that weren't supposed to exist.
Upstream Kernel Contributions | devinwittmayer@gmail.com
Enterprise Endpoint Protection
- Reverse engineered proprietary binary IPC protocol to discover quarantine bypass and cloud log injection vulnerabilities in a major security vendor's Linux EDR product. Malware can survive detection indefinitely; audit logs can be poisoned with fabricated paths visible in the cloud admin console. CVSS 7.1-7.3 (High).
Network Monitoring Appliance
- Discovered local privilege escalation to root RCE in an enterprise network monitoring agent via symlink following + ld.so.preload injection. Any local user achieves persistent root access affecting all process execution system-wide. CVSS 8.8-9.3 (Critical).
Enterprise VPN Infrastructure
- Vendor licensing restrictions blocked normal operation, so I reverse engineered the entire system from compiled binaries alone—no documentation, no references, no source code. Reconstructed the complete XML profile schema from scratch by tracing code paths through disassembly. Fixed unrelated bugs in the binary just to reach the vulnerable code paths. This pure black-box analysis revealed:
- Virtual gateway firmware with empty root password and single-character hardcoded credentials. Achieved root shell via GRUB modification; SSH authentication bypass proven. CVSS 9.8 (Critical).
- Command injection in VPN client route handling—traced user-controlled XML data through snprintf() directly to system() as root via static analysis. CVSS 9.0 (Critical).
IoT/Embedded Systems
- Unauthenticated D-Bus RCE on network camera firmware. Reverse engineered binary event condition serialization format to trigger arbitrary command execution via user-controllable virtual inputs. Privilege escalation grants hardware GPIO, storage, and messaging access.
Upstream Patches
- rtw89 USB TX flow control fix — Fixed mac80211 contract violation causing packet loss under load
- mt7921u TX power reporting — Traced INT_MIN bug through mac80211 subsystem, patches submitted upstream
Security Research
- WiFi adapter pentest comparison — RTL8832AU vs MT7921U for wireless security assessments
Blog
- justthetip.ca — Technical write-ups on driver debugging and security research
- Vulnerability research in enterprise security products (EDR, VPN, network monitoring)
- Binary reverse engineering without source code or documentation
- Protocol analysis and proprietary format decoding
- Root cause analysis in kernel subsystems (mac80211, USB, wireless drivers)
- Exploit development and proof-of-concept creation
- Technical writing that gets bugs fixed
Remote security research, vulnerability research, or driver development roles.
Contact: devinwittmayer@gmail.com | Vancouver Island, BC | Available immediately