Hussein Daher

@HusseiN98D

Bug bounty hunter - If you're reading this I love you. - hussein98d@gmail.com -

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @HusseiN98D

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HusseiN98D

  1. Prikvačeni tweet
    7. srp 2019.

    An overview of what I did for my recent $10 000 bug. Always go for the highest impact!

    Poništi
  2. 2. velj

    To those who still wonder, this was a pentesting work, not on a Bug Bounty website. I do share because people might get ideas from these kind of reports. Thank you for those showing love and also to those sharing hate!

    Prikaži ovu nit
    Poništi
  3. 2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  4. 29. sij

    Anyone know where is the website source code folder in a website using jboss with Java 8? GOT a LFI and going for leverage!

    Poništi
  5. 25. sij

    time: combine Arjun from with BurpIntuder to bruteforce parameter values. I once got "?debug" as a valid parameter and got "on" as a good value which disclosed juicy information helping me chain bugs to a P1. Final: "?debug=on" RT & L

    Poništi
  6. 22. sij

    time: I've got a RCE by using this tip: while testing for malicious file uploads, if .php extension is blacklisted you can try .PhP , .php5 and .php3 Sometime this fools the backend and you get shell! RTs & comments are appreciated. Follow

    Poništi
  7. 21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  8. 20. sij

    Time for a new tip! When I sign up to a website/newsletter/reset password, I look at the website which hosts the logo/image in the email I receive. This led me multiple time to insecure AWS S3 buckets and scope expansion.

    Poništi
  9. 19. sij

    I must say sorry to all my and followers for being off for the past month. But no worries, I'll come back with exciting news soon. I'll be hiring too! Stay tunned for a tomorrow 🎉

    Poništi
  10. 19. sij

    What are the hacking gadgets you own?

    Poništi
  11. 18. sij
    Poništi
  12. 10. sij

    Me watching people run over Citrix RCE while I'm poping shells

    Poništi
  13. 9. sij

    Anyone uses DELL XPS 13 2 in 1 for hacking/bug bounty? How is it? I'm thinking about getting one or going for the 15 Inc

    Poništi
  14. 7. sij

    Looking for a good workspace for myself where I can share notes, files, pictures and other stuffs. I have a Linux box and an iMac. Any suggestion?

    Poništi
  15. 5. sij

    For the business proposals I'm getting on DMs please send those to my e-mail in my description. Work proposal - business opportunities

    Poništi
  16. 2. sij

    Looking for a marketing expert for a gold deal. DM if you know someone:)

    Poništi
  17. 1. sij

    Happy new year to my followers. This will be our year.

    Poništi
  18. 25. pro 2019.

    Hello, merry Christmas! I need a marketing expert - please mention people if you know!

    Poništi
  19. 17. pro 2019.

    Hey everyone, best course/books/videos to learn Python for Pentesting?

    Poništi
  20. 8. pro 2019.

    When is the last time you have found a critical? What was it?

    Poništi
  21. 3. pro 2019.

    Nowadays I'm collecting more NDAs than bounties.. feels good :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·