Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @akit1337
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @akit1337
-
akit1337 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
akit1337 proslijedio/la je Tweet
Story of SSRF SSRF to admin access http://1.Target was like this-> http://Site.com/users/view/data?uri= … 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .
Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on adminHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
CVE-2019-18426 From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE Bounty: $12,500
#bugbounty https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers:
@rootxharsh - Appsec@Vimeo & bug bounty hunter@Hacker0x01@ahm3dsec - Penetration tester and bug bounty hunter@cobalt_io &@synack Signup - http://meetu.ps/c/4xGLn/FNsMn/d#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Got a new CVE
Title: phpList Authentication Bypass
CVE ID: CVE-2020-8547
Vulnerability Type: PHP type Juggling / Loose Comparisonpic.twitter.com/WItl6yENRoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Exploiting Insecure Firebase Database! https://blog.securitybreached.org/2020/02/04/exploiting-insecure-firebase-database-bugbounty/ …pic.twitter.com/EXmrMSv9tg
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE" https://jatindhankhar.in/blog/responsible-disclosure-breaking-out-of-a-sandboxed-editor-to-perform-rce/ …pic.twitter.com/E7VBsoJwdY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Airbnb
#bugbounty https://link.medium.com/eC4n4GTUN3 https://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect … https://www.arneswinnen.net/2017/06/authentication-bypass-on-airbnb-via-oauth-tokens-theft … https://buer.haus/2017/03/31/airbnb-web-to-app-phone-notification-idor-to-view-everyones-airbnb-messages/ … https://buer.haus/2017/03/13/airbnb-ruby-on-rails-string-interpolation-led-to-remote-code-execution/ … https://buer.haus/2017/03/09/airbnb-chaining-third-party-open-redirect-into-server-side-request-forgery-ssrf-via-liveperson-chat … https://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities …#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Hyatt Hotels disclosed a bug submitted by mikesbountyacct: https://hackerone.com/reports/478813 - Bounty: $300
#hackerone#bugbountypic.twitter.com/pgZT0xAuEC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them. https://medium.com/@inonst/31-tips-api-security-pentesting-480b5998b765 …
#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
#ffuf@ngkogkos@joohoi@Jhaddix Subdomain bruteforce with ffuf on 443 port. It works fine ffuf -u https://FUZZ.rootdomain.com -w jhaddixall.txt -v | grep "| URL | " | awk '{print $4}'Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()//
#xss#bugbountytip#bugbountytips#bugbounty#hacking@brutelogicpic.twitter.com/ltjUpiL4Cu
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Anyone! who can explain help in learning about writeable Firebase db? I'm testing again't my own app with public permission! ref: https://hackerone.com/reports/684099 the report and poc at https://medium.com/@danangtriatmaja/firebase-database-takover-b7929bbb62e1 … doesn't really show a proper way to write data?
#NoobMe#BugBountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
I disclosed my find https://hackerone.com/reports/763994
@Hacker0x01@jobertabmaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Github Pages takeover is for leets. We are talking about
@github account takeover now! XD#infosec#bugbountytips#bugbountypic.twitter.com/k3sMKTPWoz
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo(http://github.com/site/ ) 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like http://github.com/site/ Successful takeover
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je Tweet
Expanding the Attack Surface: React Native Android Applications
#MobileSecurity#AndroidSecurity by@infosec_au https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ …pic.twitter.com/lXSc1KNFpb
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
akit1337 proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.