Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @LocalHost31337
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LocalHost31337
-
Prikvačeni tweet
Sharing Is Caring
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
One of good reference: http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet … • Save it to *.py; • wget from your web shell - they blocked some chars but no for : and / • chmod the *.py; • Listen at your server and execute the *.py; at target. InshaAllah this one make me got my 52th P1. Alhamdulillah.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
WooT! There is always a way. New
#bugbounty#pentest short write up! Chain the bugs till you get what you want.#bugbountytip#bugbountytips#hacking Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:)
pic.twitter.com/nlAv4pMPhx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
RE just retired from
@hackthebox_eu. As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.https://0xdf.gitlab.io/2020/02/01/htb-re.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
I just published Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$ https://link.medium.com/LENn7P8Xj3
@googlevrp#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
An Interesting Account Takeover:
#infosec#bugbountytips#BugBountyTip#hackerone#bugcrowd Credits:@fatratfatrat

pic.twitter.com/fPCoT5hV5W
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Yay, I was awarded a $750 bounty on
@Hacker0x01! https://hackerone.com/elmahdi#TogetherWeHitHarder#Bugbountypic.twitter.com/Gv82V8gLx8
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
I always had a hard time finding
@GoogleVRP writeups beacuse they were all over the place in different blog posts, so I made this. If you know of something that is not in there, you are more than welcome to contribute!
#BugBonty#infosec#GoogleVRPhttps://github.com/xdavidhu/awesome-google-vrp-writeups …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Funniest Bug ever found? Mine: discovered a subdomain named admintoools-prod. Had a login page tried multiple logins nothing worked, a js file passed in some requests had an endpoint listed as /adm/v1/Signup 1/*
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
$40,000 Bugs Microsoft Edge (Chromium) - EoP via XSS to Potential RCE https://leucosite.com/Edge-Chromium-EoP-RCE … Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty …
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!
#BugBountypic.twitter.com/EX4tXLPH2J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC!
https://www.allysonomalley.com/2020/01/06/saying-goodbye-to-my-favorite-5-minute-p1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Bismillah... Simple proof of concept flaw in authentication | subdomain google platform https://medium.com/@danangtriatmaja/bug-bounty-flaw-in-authentication-get-hall-of-fame-google-6196726ee5b9 …
#bugbounty#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
2nd critical of this week.
#BugBountyTip Abuse ouath Sign-up flow: 1) Use phone number instead email in 3rd party to sign-up. 2) Link victim's email to your 3rd party account while singnup on target. 3) Login to vicitim's account using your 3rd party account.pic.twitter.com/4yrK5KXa4v
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
#BugBountyTip time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on@Burp_Suite to do achieve this!#bugbountytips#infosec#hacking#pentest#pentesting#bugbounty RT and Follow, book coming!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Here my GitHub with many scripts useful for red teamers - Enjoy! https://github.com/BankSecurity/Red_Team …
#redteamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
apapedulimu proslijedio/la je Tweet
A wonderful journey of
#OSCP teach me a lot of things Here is my story and writeup for those who want to pass#OSCP#Exam and I would really like thank you for making my skill level best to@offsectraining@ippsec@hackthebox_eu@g0tmi1k@thecybermentor.https://medium.com/@parthdeshani/how-to-pass-oscp-like-boss-b269f2ea99d?postPublishedType=initial …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
apapedulimu proslijedio/la je Tweet
Do you struggle to understand
#Kerberos in#ActiveDirectory environment ? This new article may help clarify things by simply explaining how Kerberos works. It is the first of a serie of posts about attacking Active Directory. Stay tuned
https://en.hackndo.com/kerberos/ Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.