Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Stonejiajia
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Stonejiajia
-
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Interactive Guide to Buffer Overflow Exploitation : https://nagarrosecurity.com/blog/interactive-buffer-overflow-exploitation … cc
@bordplate Interactive Beginner's Guide to ROP :https://nagarrosecurity.com/blog/interactive-rop-tutorial …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
What do you do when doing blackbox web testing that may be obvious to you but not so obvious to other people?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
JWT Attack Playbook (Primer + all known exploits against JWT + more) :https://github.com/ticarpi/jwt_tool/wiki …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Once you have a list of subdomains your next steps are literally >nmap >content discovery >more content discovery based on that content >googling for specific CVE's based on identifiers >more content discovery >more content discovery >find a bug >repeatpic.twitter.com/dCYKRGa3Cm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
ICYDK I made a slide deck about the basics of PDF structures.https://speakerdeck.com/ange/lets-write-a-pdf-file …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
We have a look at another interesting XSS vector due to weird Firefox parsing, and then explore how researchers find this stuff. https://www.youtube.com/watch?v=yq_P3dzGiK4 …pic.twitter.com/VKq30lguKk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Got RCE or SSRF inside an AWS Lambda function? Request "localhost:9001/2018-06-01/runtime/invocation/next" for the function's event data. Check the HTTP headers returned too!
@RhinoSecuritypic.twitter.com/2dP7PnE988
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
#ProTip If you need to mix Turbo Intruder with other@Burp_Suite extensions (like Hackvertor or Logger++), simply add "engine=Engine.BURP" to RequestEngine(). Note: the custom HTTP stack is _much_ faster than the default one, so this change will slow down thingsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
If CSP policy points to a dir and you use %2f to encode "/", it is still considered to be inside the dir. All browsers seem to agree on that. This leads to a possible bypass, by using "%2f..%2f" if server decodes it, example: https://jsbin.com/werevijewa/edit?html,output …pic.twitter.com/IFIq5G1uwl
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Note sure why "AWS Signer" by
@NetSPI isn't in the@Burp_Suite BApp Store, but it's sooooo useful when interacting with authenticated AWS endpoints (S3, API Getway, ...). And it supports temporary Cognito creds!https://github.com/NetSPI/AWSSigner …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Revealing AWS S3 bucket name: step 1: Find any CDN object URL step 2: append following string to after URL: `?AWSAccessKeyId=[Valid_ACCESS_KEY_ID]&Expires=1766972005&Signature=ccc ` and boom it will reveal the bucket name.
#BugBounty#security#bugbountytip#bugbountytipspic.twitter.com/JWqGuZLHW4
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Testing a Ruby on Rails app? Add .json to the URL and see what happens!
Thanks for the #BugBountyTip,@yaworsk!
pic.twitter.com/oHlHilQtr7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Our guy,
@SecurityMB, had a presentation at OWASP Poland Day about exploiting prototype pollution to RCE on the example of Kibana, by abusing environmental variables in node. The slides are here: https://slides.com/securitymb/prototype-pollution-in-kibana/#/ … We will also release a writeup soon so stay in touch!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
If you're new or been in InfoSec for awhile and you've not read these 2 classic papers, take 15 minutes today and do it. Thank me later. https://www.cs.virginia.edu/~evans/cs551/saltzer/ … https://www.archive.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
I paid for something, got receipt in PDF, changed a parameter, and got the AWS token... This was a nice reference :)https://twitter.com/NahamSec/status/1161130930339110912 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
[CPR-Zero] We removed the view restriction from the SQLite vulnerabilities affecting iOS \ macOS https://cpr-zero.checkpoint.com/vulns/cprid-2118/ … https://cpr-zero.checkpoint.com/vulns/cprid-2119/ … https://cpr-zero.checkpoint.com/vulns/cprid-2120/ … https://cpr-zero.checkpoint.com/vulns/cprid-2121/ …https://twitter.com/_CPResearch_/status/1160510670414237696 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Time-Based Blind SQL Injection In GraphQL The “sortc” parameter in the http://example.com/api/graphql endpoint was vulnerable to a SQL injection. 1) Login to the website. 2) Intercept the following request: 3) In the request body, add “OR SLEEP(20)” in sortc https://blog.usejournal.com/time-based-blind-sql-injection-in-graphql-39a25a1dfb3c …pic.twitter.com/WQy5CjQRnS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Understand, don't memorize.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
SELECT code_execution FROM * USING SQLite;https://research.checkpoint.com/select-code_execution-from-using-sqlite/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
奥卡姆剃刀下的蚂蚁世界 proslijedio/la je Tweet
Whitepaper and slides for our .NET SAML bypass research is now available at
@BlackHatEvents server: http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace-wp.pdf … [WhitePaper] https://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace.pdf … [Slides] https://github.com/pwntester/DupeKeyInjector … [Burp Plugin]Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.