Tweetovi

Blokirali ste korisnika/cu @0xfsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xfsec

  1. proslijedio/la je Tweet
    prije 9 sati

    Burp Suite 2 Playlist updated: Includes vids for Free and Pro editions

    Poništi
  2. proslijedio/la je Tweet
    prije 13 sati

    Watch my talk from the last meetup and learn: - 2 Complex API exploits I found that led to full account takeover - How to expand your attack surface and find more API endpoints - How to combine Mass Assignment & CSRF

    Poništi
  3. proslijedio/la je Tweet
    5. velj

    We are looking for a Mobile Security Analyst to join our team at ! If you (or someone you know) are interested in this position feel free to DM me or apply here:

    Poništi
  4. proslijedio/la je Tweet

    Curious about API? Attend our first session to learn about API and its security by . Friday 02/07/2020 at 12P PST Registration link: Linkedin Post:

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    Interesting Facebook company open redirect: <put anything here>?href=<any url> e.g. Already reported but they showed no interest in it, so full disclosure it is.

    Poništi
  8. proslijedio/la je Tweet
    3. velj

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    Welcome to the Secjuice squeeze, a collection of news articles that our writers found interesting enough to want to share with and introduce to you. Compiled by , , , , and .

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  11. proslijedio/la je Tweet
    31. sij

    If you have any questions or topics that you want to hear about from me, I encourage you to fill out this form: The content I create will be based on whatever you put in that form. If you can think of any other ways that I can help the community... 4/5

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    Hallo! Over the last year or so, the amount of questions/DMs I receive each day has increased dramatically, and I'm struggling to keep up. I also have a full-time job, a time-intensive side hustle (bounties), a family, a dog, etc. 1/5

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    -API TIP:30/31- Got stuck during an API pentest? Expand your attack surface! If the API has mobile clients, download old versions of the APK file to explore old/legacy functionality and discover new API endpoints.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    31. sij

    So I just found out about the Application for a Pardon I can send to .. I am going to try and request a pardon to have all of my rights restored from my previous hacking convictions. I am going to need character witnesses for this process... 1/x

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij

    -API TIP:29/30- APIs expose the underlying implementation of the app. Pentesters should leverage this fact to better understand users, roles, resources & correlations between them and find cool vulnerabilities & exploits. Always be curious about the API responses.

    Poništi
  16. proslijedio/la je Tweet
    29. sij

    We all love Burp suite by , right? Want to send over all the ffuf job matches to Burp? Easy with -replay-proxy ffuf -u -w wordlist.txt -replay-proxy http://127.0.0.1:8080 If you ffuf on remote box, this totally works through ssh tunnels too!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. sij

    Join us next week and learn about API Security & the OWASP Top 10 for APIs

    Poništi
  18. 30. sij
    Poništi
  19. proslijedio/la je Tweet
    29. sij

    Last call! TODAY at a 1 PM EST Webinar on "Shellcode For The Masses" with the Network, I will introduce what is, how it's used, discuss some binary techniques and security mitigations, and showcase some demos!

    Poništi
  20. 29. sij

    Hi can I have your presentation slide "A Methodology using fuzzing and info disclosure".. it was an epic talk!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·