Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ArbazKiraak
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ArbazKiraak
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Arbaz Hussain proslijedio/la je Tweet
#writeup by@WeizmanGal $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)#BugBounty#infosechttps://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers:
@rootxharsh - Appsec@Vimeo & bug bounty hunter@Hacker0x01@ahm3dsec - Penetration tester and bug bounty hunter@cobalt_io &@synack Signup - http://meetu.ps/c/4xGLn/FNsMn/d#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE" https://jatindhankhar.in/blog/responsible-disclosure-breaking-out-of-a-sandboxed-editor-to-perform-rce/ …pic.twitter.com/E7VBsoJwdY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.
#bugbounty#ctfhttps://blog.shoebpatel.com/2020/01/31/Facebooks-BountyCon-2020-CTF-Writeup/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumarhttps://link.medium.com/sC7JJUxgG3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
We all love Burp suite by
@PortSwigger , right? Want to send over all the ffuf job matches to Burp? Easy with -replay-proxy ffuf -u https://example.org/FUZZ -w wordlist.txt -replay-proxy http://127.0.0.1:8080 If you ffuf on remote box, this totally works through ssh tunnels too!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Don't mince your words, say it as it is.
@republic isn't a news channel, it has no relationship with journalism, whatsoever. The channel is criminal.#BanRepublicTvpic.twitter.com/ZXJuSqU7zc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
-API TIP:26/31- Looking for BOLA (IDOR) in APIs? got 401/403 errors? AuthZ bypass tricks: * Wrap ID with an array {“id”:111} --> {“id”:[111]} * JSON wrap {“id”:111} --> {“id”:{“id”:111}} * Send ID twice URL?id=<LEGIT>&id=<VICTIM> * Send wildcard {"user_id":"*"}
#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
One more: Find a subdomain such as <grafana>.corp.company.com which points to a external IP example however only accessible inside VPN and such SSRF could be leveraged in that way. You can often find such hosts over SSL. Have exploited such in pasts. Might even be a
#bugbountytip https://twitter.com/jobertabma/status/1222264580329488385 …pic.twitter.com/BVA99w6ios
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
So glad to finally be able to release Collaborator++! It adds the ability to view interactions from all contexts, manually poll for interactions on old contexts, and secure your private servers with a pre-shared key!https://research.nccgroup.com/2020/01/28/tool-release-collaborator/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
If the remote target running on Windows OS, it might be possible to leverage this SSRF vulnerability to steal the user/service (running the IIS server) Net-NTLM hash using
@PythonResponder tool. A good blog post on this topic can be found athttps://blog.blazeinfosec.com/leveraging-web-application-vulnerabilities-to-steal-ntlm-hashes-2/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
How India's prime minister and his party are endangering the world's biggest democracy. Our cover this week https://econ.st/30PhRi1 pic.twitter.com/4GsdtTGnKe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je Tweet
Nice, found an older adminer version on a host which allows using "Elasticsearch (beta)" as a source and it turns out, we can abuse this. At least blind ssrf ;)
#bugbountytippic.twitter.com/rj59BI1SHv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Arbaz Hussain proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Arbaz Hussain proslijedio/la je Tweet
Proud to announce another tool from Team PD. Best part is it can be very easily integrated in your piplines. It's intended to be very flexible and simple. Try it out at https://github.com/projectdiscovery/naabu …https://twitter.com/emgeekboy/status/1219695209048526848 …
0:04Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

