Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @MrTuxracer
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MrTuxracer
-
Prikvačeni tweet
I've talked to
@maksumuto from@SZ, one of Germany's most reputable newspapers about my life as a full-time#BugBounty hunter. You can find the article online and also in today's print version of the newspaper! (both only in German) https://www.sueddeutsche.de/wirtschaft/hacker-netzwerke-computer-geheimdienste-1.4691312 …#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Ahrens proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Ahrens proslijedio/la je Tweet
Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I've submitted my first bug of the year at 11:44 and it was accepted and rewarded at 14:26 on
@Hacker0x01. 2020 is kicking off surprisingly fast
#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I’ve just entered the
@Hacker0x01 all-time top 100 leaderboard with a pretty decent signal of 6.58. There are only a couple of people with a better signal, but hey@arneswinnen I’ll get you
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I just got two maximum bounties for thick client RCEs through file imports and a custom URI handler. It took me a moment to figure out how to unpack and pack their custom file format but persistence pays off! I really love binary exploitation
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I've reported a quite unusual RCE and got almost instantly contacted by the corresponding
@Hacker0x01 program manager telling me how nice that RCE is
It's really about such small things that keep me motivated. In return, I've just submitted my second RCE...
#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I want to give a huge shout-out to my
#h1213 team@Hogarth45_ND@plmaltais and@ArchAngelDDay because it's still raining bounties!!
That was really awesome work guys!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
After flying business class two times with
@lufthansa, I must say that it comes pretty close to my favourite business class with@SingaporeAir. Thanks for the excellent service!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Thank you very much
@Hacker0x01@DeptofDefense and@TheParanoids for an amazing#h1213! I'm always excited to meet so many smart hackers
See you at the next event! #togetherwehitharderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Another cool thing about
@Hacker0x01 live hacking events: Having early jet lag breakfasts at 6am with@inhibitor181 and@smiegles
#TeamJetLag#h1213Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
On my way to Los Angeles for
@Hacker0x01's#h1213
Looking forward to meeting old and new friends and pwning all the stuff with my team
. This is going to be awesome! #togetherwehitharderpic.twitter.com/gsAwW49r5v
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just tried to responsibly report an unauthenticated SQL Injection to a vendor who literally told me that they don't work with 3rd parties to resolve issues, but always wait for their clients to prompt them.
#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Julien Ahrens proslijedio/la je Tweet
A Tale of Exploitation in Spreadsheet File Conversions - Researching exploitation in headless document conversion in LibreOffice w/
@erbbysam,@Smiegles,@Daeken https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ …pic.twitter.com/lwPkzfwRy0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This adrenaline rush when you find an RCE...
#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'll be at
#itsa19 with@Hacker0x01 tomorrow talking about my life as a full-time#BugBounty hunter, my hacking methodology and my coolest findings. Come to the booth and say hello
#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Over the past year, I've spent a lot of time building my own recon/automation/continuous scanning tool from scratch. I've learned a lot about Python/Flask, MongoDB, RabbitMQ, Vue.js and Bootstrap during this time, which makes it even better
#BugBountypic.twitter.com/MT9RxAzSce
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
1. First Program: PayPal 2. Had difficulties: Uber (hardened) 3. Most used Platform: HackerOne 4. Totally hate: Yahoo (scammed me) 5. Most loved: Private program 6. For beginners: DoD (super huge scope!)https://twitter.com/NahamSec/status/1180170460945735681 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'll be visiting Seoul in January! What's a good place to stay for a week? Probably somewhere around Namdaemun?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
After almost two days of recon against a single WAF-protected host, I finally popped it today
Persistence is key! #BugBountypic.twitter.com/k9SntK3gU0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.