Ajay Kulal

@Ajay_kulal

Hacker 🇮🇳

Mumbai, Maharashtra
Vrijeme pridruživanja: svibanj 2011.
Rođen/a 13. siječnja

Tweetovi

Blokirali ste korisnika/cu @Ajay_kulal

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ajay_kulal

  1. Prikvačeni tweet
    25. lis 2019.
    Poništi
  2. proslijedio/la je Tweet
    7. sij

    Ding dong, SHA1 is dead.

    Poništi
  3. proslijedio/la je Tweet
    6. sij
    Poništi
  4. proslijedio/la je Tweet
    2. sij

    CVE-2019-10758 post-auth Remote Code Execution in mongo-express < 0.54.0 via endpoints that uses the `toBSON` method however there are lots of no-auth mongo-express ... shodan: poc:

    Poništi
  5. proslijedio/la je Tweet
    1. sij

    Why not step into the next decade with WAF bypasses? Here are some gifts.😎 - Imperva <a69/onclick=write&lpar;&rpar;>pew - DotDefender <a69/onclick=[0].map(alert)>pew - Cloudbric <a69/onclick=[1].findIndex(alert)>pew Happy 0x32303230.😉

    Poništi
  6. proslijedio/la je Tweet

    Just posted From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13 - to be followed up with a second writeup on bug I've found with these tools.

    Poništi
  7. proslijedio/la je Tweet
    14. pro 2019.

    I am exploring fuzzing, started with this

    Poništi
  8. proslijedio/la je Tweet
    13. pro 2019.

    On September 29, 2017, Discuz! fixed a vulnerability that would cause front-end users arbitrarily deleting files. Knownsec 404 Team have made recurrence and posted an analysis about it. Learn more on Seebug Paper: and Medium.

    Poništi
  9. proslijedio/la je Tweet
    9. pro 2019.

    A 10 million euro GDPR violation fine for failing to update phone call authentication protocols. This is huge. Hopefully this example jump starts more companies to secure their phone support!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    5. pro 2019.

    Let's say that during a pentest you discover requests to <name>.azure-api.net 🤔 🎉 Congratulations it means that you found an API hosted by Azure API Management! The root doesn't reveal anything but you can go to <name>.portal.azure-api.net to see its documentation (& more!) 🕵️

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    3. pro 2019.

    Hi, and . I'm building a test tool for WebSocket Connection Smuggling, and I don't know what else to add. I made basic check feature, and will be put in a code that scan the internal port(or ip range?)s through Smuggling.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. stu 2019.

    huge productivity boost needed? Go and check out in case you use Firefox for testing. This eases multiple account / tenant testing by a mile. Shoutout to , who showed me this add-on in the first place! 🥳

    Poništi
  13. proslijedio/la je Tweet

    Follow this step-by-step guide to properly test for … Like a ! by

    Poništi
  14. proslijedio/la je Tweet
    26. stu 2019.

    Quick and dirty way to find parameters vulnerable to LFI & Path Traversal & SSRF & Open Redirect: Burp Search > Regex \?.*=(\/\/?\w+|\w+\/|\w+(%3A|:)(\/|%2F)|%2F|[\.\w]+\.\w{2,4}[^\w]) Suggestions are welcome.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    23. stu 2019.

    if you are interested in finding 0-days vulnerabilities from reading codes, here are some articles that I wrote about how I managed to find 0-day RCEs from static code analysis. I hope that will help you all! More to come soon ;)

    Poništi
  16. proslijedio/la je Tweet
    24. stu 2019.
    Poništi
  17. proslijedio/la je Tweet
    23. stu 2019.

    Are you ready for the 11th edition of ? We present to you the inspiration for this edition - "Vaishyanath – The Protector." He is the 11th incarnation of Shiva. Here is a small blog post on the explanation of :

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    22. stu 2019.

    1) Call me vulnerable because you make my Heartbleed. 2) Thank you for giving me the creds so I could priv esc to your heart 3) Don't worry girl you are not a dupe, you are my first

    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    Shodan is turning 10 :) Can't believe it's already been a decade. I'm excited as ever to be working on something I love and thank you to everybody that's supported the project over the years:

    Poništi
  20. proslijedio/la je Tweet

    🎉 New security blogpost 🎉 Do you know that it's pretty easy to create an HTML/JS/Wasm module polyglot? Those polyglot files are consider as valid: ✅ HTML/Javascript files ✅ WebAssembly modules Kudos to for the help ;)

    Poništi
  21. proslijedio/la je Tweet
    20. stu 2019.

    I M P O R T A N T This is a collection of nearly all known attack techniques against JWT. It also includes a tool to automate all checks and even a JWT primer.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·