ADITYA _SHENDE

@ADITYASHENDE17

Bug Hunter | Admin at Kong Cyber Security | MIT Pune | | Indian

Maharashtra, India
Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @ADITYASHENDE17

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ADITYASHENDE17

  1. proslijedio/la je Tweet
    4. velj
    Poništi
  2. Story of SSRF SSRF to admin access was like this-> 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .♥️ Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on admin

    Poništi
  3. Heyo All you liked stories of RCE and takeover Want more ? Thinking to upload daily one what you say ?

    Poništi
  4. 3. velj

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  5. 3. velj

    RCE story Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful

    Poništi
  6. 2. velj

    Coming to goa nullcon ? I am up there from 3 march to 10 march Conference and enjoy too....

    Poništi
  7. proslijedio/la je Tweet
    2. velj
    Odgovor korisnicima i sljedećem broju korisnika:

    You are looking only for traditional bugs , go explore some cheesy bugs . Follow for logical stuff , I do follow also and better dont go for common bugs like xss, csrf and limiting. Always hunt for P0 then you'll get P1 ONLY

    Poništi
  8. Poništi
  9. 30. sij
    Poništi
  10. 29. sij

    2020 will be more devil than 2019

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>

    Poništi
  12. 26. sij

    Bought this beast thank you for all

    Poništi
  13. 26. sij

    Gaining sympathy from female is the new trend in cyber security. If she don't know answer other f*ckbois wil cover her🤣🤣 what you say guys ?

    Poništi
  14. proslijedio/la je Tweet
    21. sij
    Poništi
  15. proslijedio/la je Tweet

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws by

    Poništi
  16. proslijedio/la je Tweet
    17. sij

    Hey guys, Big News will be opening students pass on Monday 20th Jan 2020 Midnight. So be ready upcoming hacker. Don't miss it. .

    Poništi
  17. 18. sij

    I earned $3,000 for my submission on With love ♥️RCE

    Poništi
  18. proslijedio/la je Tweet
    18. sij

    Happy for One more recognition for Third-I - Enhancing Policing Preventing Crimes with Digital Technologies by Computer Society Of India at Bhuvaneshvar in 2019 . This adds to 2 FICCI & 2 SKOCH awards of recognition. Pune Police Team will be in 2020

    Poništi
  19. proslijedio/la je Tweet
    16. sij
    Poništi
  20. 14. sij

    Boss bounty soon..... Hit 3 tech giants in 2020 start Oracle, Microsoft, Google What about you guys ?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·