spidersec

@SpiderSec

Security Engineer〡OSCP〡OSWP〡Exploit Research

0.0.0.0
Vrijeme pridruživanja: prosinac 2016.

Tweetovi

Blokirali ste korisnika/cu @SpiderSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SpiderSec

  1. Prikvačeni tweet
    29. stu 2019.

    HTTP Request Smuggling in one Screenshot. 🙂

    Poništi
  2. 4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  3. 28. sij

    Here's a working POC for manually performing DNS Rebinding attack. 🙂 Some people asking me for this in DM.

    Poništi
  4. 23. sij
    Poništi
  5. 22. sij

    DNS Rebinding attack in one Screenshot. 🙂

    Poništi
  6. 11. sij
    Prikaži ovu nit
    Poništi
  7. 11. sij

    It deauth nearby access points and upload handshakes to cloud. USED: 40$ Chinese rebranded phone + 5$ external wifi card. Inspired from pwnagotchi.

    Prikaži ovu nit
    Poništi
  8. 11. sij

    My pwnPi design.

    Poništi
  9. 5. sij

    [ OSINT ] Geo-locate victim from router mac address (BSSID).

    Poništi
  10. 27. pro 2019.

    My 2020 goals : - Healthy and depression free life. - Getting out of comfort zone. - Improving communication skills. - Earn enough from bug bounty and job to afford my dreams. - Dive into OSWP & OSWE - Write a lot of automation tools. - Dive into reverse engineering.

    Poništi
  11. 25. pro 2019.

    Docker misconfiguration : Low privilege users or containers having access to docker Unix Socket. Command to check : curl --unix-socket /var/run/docker.sock http://127.0.0.1/containers/json 🙂

    Poništi
  12. 14. pro 2019.

    Bash one liner to take screenshot of web services running on an IP range. IP="192.168.0"; for p in '80' '443'; do for i in $(seq 0 5); do TAKE_SS=$(cutycapt --url=$IP.$i:$p --out=$IP.$i:$p.png); done; done 😃

    Poništi
  13. 22. stu 2019.

    GOT SSRF ? - On a JAVA Web application. - Running on Windows. Don't forgot to perform NTLM Relay Attack to steal NTLM v1/v2 hashes as java HTTP-Client by default supports NTLM authentication.

    Poništi
  14. 10. stu 2019.

    6. Request With Header - 'Range: bytes= -1222,-9223372036854774586' => BooM :)

    Prikaži ovu nit
    Poništi
  15. 10. stu 2019.

    Manually Detect Remote Integer Overflow: 1. Note Content-Length. EX: 612 2. Take NO < Content-Length. Ex: 610 3. Add (610+612 = 1222) 4. Request Header - 'Range: bytes= -1222' => SAME RESPONSE 5. Subtract 9223372036854775808 - 1222 = 9223372036854774586 Continue.......

    Prikaži ovu nit
    Poništi
  16. 4. stu 2019.

    Bypass Fix of OB XXE Using Different encoding and get 2x bounty 😁 1. Encode Payload to UTF-7 2. Encode Payload to UTF-16 3. Encode Payload to UTF-16BE - Try with other encodings as well, if accepted by the XML parser.

    Poništi
  17. 31. lis 2019.

    Testing SQLI in Api's? Always start From : Boolean based >> Time based {"id":"56456"} - OK {"id":"56456 AND 1=1#"} -> OK {"id":"56456 AND 1=2#"} -> OK {"id":"56456 AND 1=3#"} -> ERROR {"id":"56456 AND sleep(15)#"} -> SLEEP 15 SEC 😃

    Prikaži ovu nit
    Poništi
  18. 19. lis 2019.

    Salesforce Object Query Language (SOQL) Injection

    Poništi
  19. 14. lis 2019.
    Poništi
  20. 29. ruj 2019.

    Wanna bypass `sameorigin` policy ? Try sending a fake Referer header with the value of parent website. EX : - GET / Host: Referer: Results Below :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·