Tweetovi

Blokirali ste korisnika/cu @PortSwiggerRes

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PortSwiggerRes

  1. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  2. 28. sij

    Many thanks for all your votes! The community has spoken, and selected 15 nominees for the Top 10 Web Hacking Techniques of 2019. We've just launched the final stage, in which the panel - , , and - will confer and select the final top 10

    Poništi
  3. 28. sij
    Poništi
  4. proslijedio/la je Tweet
    27. sij

    We've added 11 new XSS labs, with learning materials. There is new content on CSP, dangling markup injection, and escaping the AngularJS sandbox.

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    HTTP Request Smuggler now supports overriding the request method! spotted that using an alternative method like DELETE can sometimes let you exploit otherwise-secure targets. (If you accidentally delete someone's homepage, that's on your head!)

    Poništi
  7. 24. sij

    This weekend is your last chance to vote for the Top 10 (new) Web Hacking Techniques of 2019! Voting closes Monday.

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    This blind XXE technique for out-of-band exfiltration was one of the core use cases we had in mind when developing Burp Collaborator:

    Poništi
  9. 23. sij

    Ok let's close the script. That can't possibly work right? <script> x = '<!--<script>' </script>/-alert(1) </script>

    Poništi
  10. proslijedio/la je Tweet
    21. sij
    Poništi
  11. 15. sij

    We're really quite excited for HTTP/2 support in

    Poništi
  12. 14. sij

    Voting is now open for the top 10 new web hacking techniques of 2019:

    Poništi
  13. proslijedio/la je Tweet
    12. sij

    Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)

    Poništi
  14. proslijedio/la je Tweet
    10. sij

    This weekend is your last chance to nominate research for the top 10 new web hacking techniques of 2019. Voting begins on Monday!

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Released a new version of with multiple improvements:70+ unique checks, improved scan performance, new fuzzy logic to bypass weak WAF rules. cc .

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    7. sij

    For the sake of exercising, I looked up some web challenges in a and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out! 😅

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. sij

    The top 10 web hacking techniques of 2019 has some new contenders, thanks to community nominations. Keep them coming!

    Poništi
  18. Nominations are now open for the top 10 new web hacking techniques of 2019:

    Poništi
  19. proslijedio/la je Tweet

    NGINX fixed the security issue that and I found recently. See our report: The fix was made public here: We found various places that provided recommended configurations that are vulnerable.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    22. pro 2019.

    Based on community feedback, popularity, and the opinions of , we've compiled this list of the top 10 extensions for pen testers.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·