Oops!

@Corrupted_brain

A satisfied failure. Working as a Information Security Researcher.

Kathmandu, Nepal
Vrijeme pridruživanja: prosinac 2012.

Tweetovi

Blokirali ste korisnika/cu @Corrupted_brain

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Corrupted_brain

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    26. sij

    It was a superb experience playing CTF organized by Cynical Technology NepHack 3.0 pwned by team me0w

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Our team me0w won the Nephack v3 CTF. The challenges were really fun and great team work 🥵 Thanks for organizing the CTF.

    Poništi
  4. proslijedio/la je Tweet
    22. sij
    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Exploiting XML External Entity (XXE) Injections 1. XInclude attacks productId=<foo xmlns:xi=""><xi :include parse="text" href="file:/ //etc/pass wd"/></foo>& storeId=1

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. sij

    The most awaited ama with is now out you can read the entire ama here

    Poništi
  7. proslijedio/la je Tweet
    3. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    Here is my writeup regarding Subdomain Takeover The same methodology behind Donald J Trumps's website hack.

    Poništi
  9. proslijedio/la je Tweet
    19. pro 2019.

    Our very first ama with Please do read this and keep supporting us !!!

    Poništi
  10. proslijedio/la je Tweet
    24. stu 2019.

    Since 10k followers XSS challenge is over. Here is my write-up.

    Poništi
  11. proslijedio/la je Tweet
    23. stu 2019.

    EVM 1.2 is ready I'll be releasing it soon on Vulnhub. This will be extremely fun box 📦. Stay tuned note you will need to strain your skills :-)

    Poništi
  12. 19. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    17. stu 2019.

    Rewarded with for an issue which could have allowed me an access to stag & prod server. Sub-domain scan -> dir fuzz -> found a publicly exposed git -> extracted all committers email -> found one email in pw dump -> used it to log into git instance -> got creds for servers

    Poništi
  14. 15. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    14. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    14. stu 2019.
    Poništi
  17. proslijedio/la je Tweet
    9. stu 2019.
    Poništi
  18. 29. ruj 2019.

    Similar thing happened with us while we were doing physical security audit for an organization. We're lucky that cheque deposit machine had touchscreen, we popped up OSK and boom inside the machine.

    Poništi
  19. 18. ruj 2019.

    An example of social engineering in notebook. 🤣

    Poništi
  20. 16. ruj 2019.

    This Oracle directory architecture was quite helpful for me to harvest critical information by exploiting XXE and reading files locally.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·