dia2diab

@dia2diab

Nothing to Say!

EGYPT  
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @dia2diab

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dia2diab

  1. Prikvačeni tweet
    24. srp 2019.

    Happy to become one of the Most Valuable Hackers for Scope Release Event on and got an invitation for their next live hacking event. Thanks Verizon Media for giving us the opportunity!

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  3. 29. sij

    Leveled up to 0x04! via

    Poništi
  4. proslijedio/la je Tweet
    4. sij

    API Security Top 10 2019 is out! It is aimed to educate technology professionals, such as software developers, designers, architects & managers to “create awareness about modern API security issues.”

    Poništi
  5. 7. pro 2019.

    It was a nice weekend with , such a feedback keeps me hacking in their platform! Thanks

    Poništi
  6. 8. stu 2019.

    Finished Hack the Air Force 4.0 with rank #6, Thanks and for your support during our activity.

    Poništi
  7. proslijedio/la je Tweet
    7. ruj 2019.

    I just published Write up of two HTTP Requests Smuggling

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    Bug bounties are interesting - a trend I’m noticing consistently is people finding a few application bugs and considering themselves an authority on the subject. There’s always more you can learn, and presenting yourself that way is pretty disingenuous.

    Poništi
  9. proslijedio/la je Tweet
    29. kol 2019.

    My (a bit theoretical) post about the economics of the bug bounty hunting. Key metrics and maximizing $/hr.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    6. kol 2019.
    Poništi
  11. proslijedio/la je Tweet
    23. srp 2019.

    A Deep Dive into XXE Injection with Synack's Sr. Security Program Analyst Trent Gordon. In this blog, Trent explains how XXE works and how to exploit XXE vulnerabilities, then he walks through two real-world XXE attacks submitted by the Synack Red Team.

    Poništi
  12. proslijedio/la je Tweet
    10. svi 2019.

    "There is no pre-auth RCE in Jenkins since May 2017, but this is the one!" Relase a more reliable and elegant exploit - "awesome-jenkins-rce-2019" from my talk. Thanks and join this party!

    Poništi
  13. proslijedio/la je Tweet
    13. tra 2019.

    Recordings are out of "Move Fast and Secure Things (with Static Analysis)" - Would love to know your feedback :)

    Poništi
  14. proslijedio/la je Tweet
    4. tra 2019.

    I found a zero-day within a nodejs library and used it to get RCE on a Shopify application, here is the full write-up: … Thanks and for your help on this one

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    2. tra 2019.

    Blog post: Introducing the Web Security Academy

    Poništi
  16. proslijedio/la je Tweet
    27. velj 2019.

    Well-earned congratulations to , , Olivier Arteau, , , , Robin Peraglie, / and Luan Herrera! Your research is an inspiration to us all 🎉

    Poništi
  17. proslijedio/la je Tweet
    23. velj 2019.
    Poništi
  18. proslijedio/la je Tweet
    7. velj 2019.

    ClusterFuzz, an infrastructure used for fuzzing Chrome and OSS-Fuzz, is open source now! Enjoy responsibly :) Blog: Code:

    Poništi
  19. proslijedio/la je Tweet
    20. sij 2019.

    Just posted a writeup for 's l33t-hoster challenge, a fun CTF challenge featuring polyglots, LD_PRELOAD and PHP's mail() in order to bypass things.

    Poništi
  20. 7. stu 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·