akit1337

@akit1337

eat sleep hunting

भारत
Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @akit1337

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @akit1337

  1. proslijedio/la je Tweet
    prije 18 sati
    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    Story of SSRF SSRF to admin access was like this-> 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .♥️ Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on admin

    Poništi
  3. proslijedio/la je Tweet
    prije 23 sata

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  4. proslijedio/la je Tweet

    Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers: - Appsec & bug bounty hunter - Penetration tester and bug bounty hunter & Signup -

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  6. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    4. velj

    I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"

    Poništi
  9. Poništi
  10. proslijedio/la je Tweet
    4. velj

    Hyatt Hotels disclosed a bug submitted by mikesbountyacct: - Bounty: $300

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  12. proslijedio/la je Tweet

    Subdomain bruteforce with ffuf on 443 port. It works fine ffuf -u -w jhaddixall.txt -v | grep "| URL | " | awk '{print $4}'

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    XSS filter bypass using stripped </p> tag to obfuscate. P2 Stored XSS $1500 on a private bug bounty program. XSS Payload: <</p>iframe src=javascript:alert()//

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. velj

    Anyone! who can explain help in learning about writeable Firebase db? I'm testing again't my own app with public permission! ref: the report and poc at doesn't really show a proper way to write data?

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. velj
    Poništi
  17. proslijedio/la je Tweet
    11. ruj 2019.

    Github Pages takeover is for leets. We are talking about account takeover now! XD

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    3. velj

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  19. proslijedio/la je Tweet
    2. velj
    Poništi
  20. proslijedio/la je Tweet
    2. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·