Tweetovi

Blokirali ste korisnika/cu @SecurityKsl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SecurityKsl

  1. 31. sij
    Tweet je nedostupan.
    Poništi
  2. 29. sij

    Wanted to test authentication mechanism for one of the bug bounty programmes. Typed in random account name and password 'Test123' to capture the request. It worked. Wondering if i get any bounty for that.

    Poništi
  3. 14. sij

    Uh, one hard choice. Probably HTTP request smuggling because of huge number of systems affected.

    Poništi
  4. 28. pro 2019.

    Non-standard vulnerabilities: - go to Google search for 'site: <yourdomain>' - go to last page - look for e-mail addresses disclosed in URLs (usually in forget password or invitation functionalities) - report as incorrectly configured indexing protection - PROFIT

    Poništi
  5. 27. pro 2019.

    Leveled up to 0x03! przez Back to 0x03 :)

    Poništi
  6. 24. pro 2019.
    Poništi
  7. 5. pro 2019.
    Poništi
  8. 4. pro 2019.
    Poništi
  9. 2. pro 2019.

    lolz, these tutorials are getting better and better

    Poništi
  10. proslijedio/la je Tweet
    30. stu 2019.

    Next OWASP Poland meeting is just 3 days ahead. See you Tuesday evening in Krakow:

    Poništi
  11. 20. stu 2019.

    Passed AWS SAA exam yesterday, as a first step to AWS Security cert. Sharing my thoughts here:

    Poništi
  12. proslijedio/la je Tweet
    12. stu 2019.

    There are no shortcuts in . I've spent thousands of hours and still consider myself a skid most of the time. Whoever is impatient in their eagerness for success will have a tough time reaching it, if ever.

    Poništi
  13. 14. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    5. lis 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Im just sick and tired of people asking for tips, tools, and techniques without doing any god damn research themselves. We’re living in the most revolutionary period of history in terms of access to information and the best most people can do is go “pls sir check ur dms”

    Poništi
  15. proslijedio/la je Tweet
    26. ruj 2019.

    So I am about 90 followers away from 10k... So decided to do a little give away when I hit the 10k mark. Anyone that shares this will be entered into a drawing, and I will give the winner (chosen randomly) a 1 year Burp Pro liscense.

    Poništi
  16. proslijedio/la je Tweet
    23. ruj 2019.

    At OWASP Poland Day will be speaking about trusted types and how this can save you from DOM XSS. Full agenda and registration:

    Poništi
  17. 22. ruj 2019.

    I will be presenting my thoughts on inter-application vulnerabilities during OWASP Poland Day in Wrocław (16th of October). Full agenda here - . 10% discount code - 1337_FR13ND5

    Poništi
  18. proslijedio/la je Tweet
    18. ruj 2019.

    We've just published Poland Day 2019 agenda! 2 tracks, 19 lectures, 300+ attendees. Check it out and register:

    Poništi
  19. 5. kol 2019.

    According to RFC5322 "<script>alert(1)</script>".com is a perfectly valid e-mail address while according to myself it is a perfectly valid Bug Bounty payload. More on that soon.

    Poništi
  20. proslijedio/la je Tweet
    30. lip 2019.

    "Inter-application" vulnerabilities - hunting for bugs in secure applications" - Marcin Szydłowski If you missed this lecture, here is a video 🎥

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·