Tweetovi

Blokirali ste korisnika/cu @Sajibekantibd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Sajibekantibd

  1. 5. velj
    Poništi
  2. 5. velj
    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. 28. sij
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Here's a working POC for manually performing DNS Rebinding attack. 🙂 Some people asking me for this in DM.

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    While looking in github for information desc do check commit history sometimes they remove the tokens but don't change or revoke them ;)

    Poništi
  7. 23. sij
    Poništi
  8. proslijedio/la je Tweet
    21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  9. 22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  10. proslijedio/la je Tweet
    20. sij

    Google dork site: target this will help you find S3 buckets Razer S3 Bucket Hacked by $$ 500 $$ Write Up

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    Looking for kubelet information exposure? Use shodan and type this keyword : product:"Kubernetes" port:"10250" And try https://x.x.x.x:10255/pods

    Poništi
  12. 20. sij
    Poništi
  13. 20. sij
    Poništi
  14. 16. sij
    Poništi
  15. 10. sij
    Poništi
  16. proslijedio/la je Tweet
    8. sij

    CSRF + XSS + SMS spoofing + Android deep link URL redirection Great example of chaining low impact vulnerabilities in to remotely manipulate account content -delete user video -upload user video -make "private" videos "public" via

    Poništi
  17. proslijedio/la je Tweet
    9. sij

    While waiting for writeup from , I just found that this is not his first writeup. I bet no one ever read this, great post, thanks for sharing

    Poništi
  18. 5. sij

    “ Upload .htaccess as image to bypass filters” in Old days we Shell web using this method ;)

    Poništi
  19. 4. sij

    “A Deep Dive On The Most Critical API Vulnerability — BOLA” by Inon Shkedy

    Poništi
  20. 4. sij

    “Introducing Hakrawler: A Fast Web Crawler for Hackers” by Luke Stephens ()

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·