Nilotpal Saini

@_r00t3r_

Cyber Security Enthusiast

Hyderabad, India
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @_r00t3r_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_r00t3r_

  1. proslijedio/la je Tweet

    Windows isn't a favorite feature, but details a bug submitted by Eduardo Braun Prado that shows how you can use it to escalate from guest to SYSTEM (includes video)

    Poništi
  2. proslijedio/la je Tweet
    23. kol 2019.

    Slides for my Hitcon 2019 talk has been uploaded! It covers everything I know about cookie exploitation.

    Poništi
  3. proslijedio/la je Tweet
    26. lip 2019.

    TFW you want to pwn a CTF challenge so bad you end up pwning the CPU

    Poništi
  4. 22. ožu 2019.

    Finally its time to kill some demons in style

    Poništi
  5. proslijedio/la je Tweet
    8. ožu 2019.

    Technical takeaways from H1-415: Using invalid URL encoding sequences (ie %$1) can cause HTTP parameter pollution, do virtual host scanning with ports, find the origin server for things behind CDNs, and brute force GraphQL endpoints if introspection is off.

    Poništi
  6. proslijedio/la je Tweet
    7. ožu 2019.
    Odgovor korisniku/ci
    Poništi
  7. proslijedio/la je Tweet
    4. ožu 2019.
    Odgovor korisniku/ci

    Checkout for more tricks like that

    Poništi
  8. 28. velj 2019.
    Poništi
  9. proslijedio/la je Tweet
    2. velj 2019.

    We have released sources of all challenges for HackIM 2019 at Thank you all for playing Thanks to admins @harshafriend4al @pwni5h3r Rate us on CTFtime: Feedback welcome!

    Poništi
  10. 2. velj 2019.

    First time challenge setter for Nullcon HackIM. Loved to see great teams on scoreboard :D

    Poništi
  11. proslijedio/la je Tweet
    2. velj 2019.

    Phew! HackIM ctf just concluded. Time to sleep. We've disabled viewing of challenges for now. Will come back with results in some time. Hope you enjoyed and had fun. We sure did! Thanks for playing!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. velj 2019.

    We still have multiple challenges with 0 solves. We're releasing fresh hints. Check slack and go get them.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    1. velj 2019.

    Opened one more pwn chall peasy-shell by A little harder version of easy-shell

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. velj 2019.

    First Blood on @harshafriend4al and @pwni5h3r 's web chall mime checkr by GG guys.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    1. velj 2019.

    Doing Nullcon CTF. Current status:

    Poništi
  16. proslijedio/la je Tweet
    28. sij 2019.

    As promised – part 2 of the Hyper-V series is here! Featuring our awesome friends from the Virtualization Security Team :) VMBus internals? vPCI guest-to-host vulnerabilities? Opensource tooling? We have it all!

    Poništi
  17. proslijedio/la je Tweet
    28. sij 2019.

    CTF will start on 1st Feb, 10:00 pm, IST. Our team is working on the challenges for the . What kind of challenges would you like to solve? (i) Easy (ii) Hard (iii) Ultra Hard

    Poništi
  18. proslijedio/la je Tweet
    24. sij 2019.

    If you are interested in understanding how Chrome works, including references to objects and code, these videos are going to be super useful - .

    Poništi
  19. proslijedio/la je Tweet
    21. sij 2019.

    We are back with ultimate hacking challenges for you at . 36 hours CTF powered by will start on 1st Feb 10 PM (GMT+5:30). Register:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·