Avi

@dedsec_69

Hyperactive Knucklehead!!

*Confidential* xD
Vrijeme pridruživanja: ožujak 2016.

Tweetovi

Blokirali ste korisnika/cu @dedsec_69

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dedsec_69

  1. proslijedio/la je Tweet
    23. stu 2019.

    Search shodan for “aquatone_report.html” get access to dozen of recon data from other bug hunters 😂😂.

    Poništi
  2. 10. stu 2019.

    Reported my 1st bug on and I just realised that I accidentally uploaded the wrong PoC. 😭🤦🏻‍♂️

    Poništi
  3. proslijedio/la je Tweet
    5. stu 2019.
    Poništi
  4. 5. lis 2019.

    1. First Program: Delen Private Bank (on ) 2. Had difficulties: Yahoo 3. Most used Platform: HackerOne 4. Totally hate: Slower payouts 5. Most loved: A couple of private invites on h1 6. For beginners: Read the OoS to avoid -ve reputation.

    Poništi
  5. 4. lis 2019.

    CSRF was under "Out of Scope" section. So I ended up chaining it with stored XSS which lead to the deletion of any media on the victim's account. Will do a write-up soon. :)

    Poništi
  6. proslijedio/la je Tweet
    26. ruj 2019.

    So I am about 90 followers away from 10k... So decided to do a little give away when I hit the 10k mark. Anyone that shares this will be entered into a drawing, and I will give the winner (chosen randomly) a 1 year Burp Pro liscense.

    Poništi
  7. proslijedio/la je Tweet
    24. ruj 2019.

    Hello Guys, I have released my first blog post. I have tried put a light on a SSTI fuzzing techniques, a method to bypass Sandbox environment.

    Poništi
  8. 24. ruj 2019.

    The message deletion was actually the least impactful part. This bug could've been abused to read arbitrary messages without the target's user ID. Thanks

    Poništi
  9. proslijedio/la je Tweet
    19. ruj 2019.

    Hello Guys, here is my new blog post. A Stored XSS was used to bypass the SOP forming a Stored CSRF and gaining Admin access. Read more about it here: There is also a Bug Bounty tip at the end of the post. Please Subscribe to my blog!

    Poništi
  10. 13. ruj 2019.

    Came across a private invite on which has a public bug bounty program on another platform 😶

    Poništi
  11. 12. ruj 2019.

    2 more bugs to be validated on 😬😬

    Poništi
  12. proslijedio/la je Tweet

    In anticipation of the last and final season of - here’s a total recap and timeline of season 1-3. ALL OF THE SPOILERS

    Poništi
  13. proslijedio/la je Tweet

    This travel ‘influencer’ spookily has the same clouds in every photo. 😲🤔😆

    Prikaži ovu nit
    Poništi
  14. 20. kol 2019.
    Poništi
  15. 19. kol 2019.

    Alrighhhhttttt!!! ^_^ Thanks again

    Poništi
  16. 6. kol 2019.

    This was the first time I made a PoC without using burp at all. xD Thanks

    Poništi
  17. 2. kol 2019.
    Poništi
  18. proslijedio/la je Tweet
    31. srp 2019.

    who said the platform isn’t useful

    Poništi
  19. proslijedio/la je Tweet
    28. srp 2019.

    A one year old $12 500 reward If you love this style of my bugs explanation like and retweet, I'll post more. Tip: is your friend

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    I crafted this payload while testing for XSS, Hope this may help you too. '"--><Body onbeforescriptexecute="[1].map(confirm)">

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·