Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @_Ronr_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_Ronr_
-
Prikvačeni tweet
Yay, I was awarded a $300 bounty on
@Hacker0x01! For access to staff discussions https://hackerone.com/ronr#TogetherWeHitHarderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
WooT! There is always a way. New
#bugbounty#pentest short write up! Chain the bugs till you get what you want.#bugbountytip#bugbountytips#hacking Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:)
pic.twitter.com/nlAv4pMPhx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
I just got a fancy idea to create strings in
#javascript without using dangerous characters
Inspired by @garethheyes challenge from@WebSecAcademy.#bugbountytips#xsspic.twitter.com/GiAe0REwLI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumarhttps://link.medium.com/sC7JJUxgG3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
New blog post: A Less Known Attack Vector, Second Order IDOR Attackshttps://link.medium.com/okQ4s0yss3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ron Reshef proslijedio/la je Tweet
User Account Takeover via Signup Feature | Bug Bounty POC https://blog.securitybreached.org/2020/01/22/user-account-takeover-via-signup-feature-bug-bounty-poc/ …pic.twitter.com/pMhDgQ38jd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ron Reshef proslijedio/la je Tweet
A customized SharpLocker / fake login screen fools even the best sysadmin - did you lock your screen when you went for coffee ? ( https://github.com/Pickfordmatt/SharpLocker … )
#Redteam#Awareness#SharpLocker#Fakelockscreenpic.twitter.com/cOVPQeiR45Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
Into web exploitation? Want to move into OS exploitation? Do what I'm doing: Look at vulnerable URI schemes. Many windows apps can be opened using things like bingmaps://abc If you can inject params to get RCE, put it iframe embedded on a page and it's instant RCE on visitors.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
If example[.]com points to IP 1.2.3.4 and redirect to www[.]example[.]com but www[.]example[.]com doesn't point to anything (No A, AAAA, CNAME), try submitting your HTTP request to http://1.2.3.4/ with a "HOST: www[.]example[.]com" header.
#bugbountytip#bugbountytipsPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
Follow this step-by-step guide to properly test for
#XSS… Like a#KNOXSS! https://brutelogic.com.br/blog/testing-for-xss-like-a-knoxss/ … by@rodoassis@brutelogicHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. https://github.com/0xb0bb/pwndra pic.twitter.com/o1JPjyjgga
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
This also works for other embedded services (vimeo, dailymotion, twitter, facebook...)! Thanks for the
#BugBountyTip, @̶L̶i̶v̶e̶O̶v̶e̶r̶f̶l̶o̶w̶@EdOverflow!pic.twitter.com/bAE0snqYcZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ron Reshef proslijedio/la je Tweet
PayPal disclosed a bug submitted by
@alxbrsn: https://hackerone.com/reports/739737 - Bounty: $15,300#hackerone#bugbountypic.twitter.com/3t4H0qBY6Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
الحمد لله My 2020 Start with SSRF on
@Google Here is an Amazing thing i wish to share to Noobs like me. https://medium.com/@maverickNerd/recon-everything-48aafbb8987 …#Bugbounty#bugbountytips#bugbounty2020goalsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ron Reshef proslijedio/la je Tweet
My first bug bounty writeup. It was a bit inexperienced but I wanted to share :)
#bugbountytips#bugbountytip#infosechttps://medium.com/@gguzelkokar.mdbf15/xss-on-sony-subdomain-feddaea8f5ac …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
