Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @artsploit
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @artsploit
-
Prikvačeni tweet
Apache Solr Injection whitepaper is now available at https://github.com/artsploit/solr-injection/ … Thanks everyone who attended my
#defcon talk!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
The final count is in, and with 92.5 points total,
@steventseeley and@mufinnnnnnn are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.#P2OMiamipic.twitter.com/I9GSnPQom9
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Up next and making his
#Pwn2Own debut, Michael Stepankin (@artsploit) of Veracode will be targeting a remote code execution with continuation against the Inductive Automation Ignition in the Control Server category.#P2OMiami#S4x20Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Voting is now open for the top 10 new web hacking techniques of 2019:https://portswigger.net/polls/top-10-web-hacking-techniques-2019 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Just posted Remote Code Execution in Three Acts: Chaining Exposed Actuators and H2 Database Aliases in Spring Boot 2. Using a payload containing three different programming languages :)https://spaceraccoon.dev/remote-code-execution-in-three-acts-chaining-exposed-actuators-and-h2-database …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
I made some research on Java remote protocols https://i.blackhat.com/eu-19/Wednesday/eu-19-An-Far-Sides-Of-Java-Remote-Protocols.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
PoC for Kubernetes CVE-2019-16276 "X-Remote-User[space]:[space]admin"https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This man certainly knows his stuff, a new RCE in Solrhttps://twitter.com/_S00pY/status/1189504920791203841 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Want to enhance your http smuggling knowledge? I just published details of CVE-2018-8004 (August 2018 - Apache Traffic Server). https://regilero.github.io/english/security/2019/10/17/security_apache_traffic_server_http_smuggling/ …
#ApacheTrafficServerHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
New blog post on an iMessage bug that allows files to be read off an iPhone remotely! https://googleprojectzero.blogspot.com/2019/08/the-many-possibilities-of-cve-2019-8646.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Backslash Powered Scanner can now detect proxy subfolder escapes using
@orange_8361's path normalization research from last year - just enable 'experimental folder attacks'.pic.twitter.com/Lxeb2qW1LP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
The research that
@artsploit presented at Defcon is really cool. It includes a way to detect and exploit these injections, but also a taxonomy of known Solr exploits
https://twitter.com/artsploit/status/1160363531444748288 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Whitepaper and slides for our .NET SAML bypass research is now available at
@BlackHatEvents server: http://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace-wp.pdf … [WhitePaper] https://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace.pdf … [Slides] https://github.com/pwntester/DupeKeyInjector … [Burp Plugin]Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
HTTP Desync Attacks: Request Smuggling Rebornhttps://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Attacking Unmarshallers :: JNDI Injection using Getter Based Deserialization Gadgets https://srcincite.io/blog/2019/08/07/attacking-unmarshallers-jndi-injection-using-getter-based-deserialization.html … thanks to
@Doyensec for the inspiration!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich (
@natashenka) - https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Struggling to exploit H2 DB? This may help: we found a new way utilizing native libraries and JNI. Kudos to
@mwulftange https://codewhitesec.blogspot.com/2019/08/exploit-h2-database-native-libraries-jni.html …pic.twitter.com/fbiXw7inY2Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sick technique to achieve RCE via JDBC string manipulationhttps://twitter.com/Doyensec/status/1153388589608316928 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Michael Stepankin proslijedio/la je Tweet
Short story about blind HQL Injection (MySQL case)
#hqlinjection#hibernate#spiderlabshttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/hql-injection-exploitation-in-mysql/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.