Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @dsourch3r
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dsourch3r
-
dsourcher proslijedio/la je Tweet
detect the version of the target SSH server: msf > use auxiliary/scanner/ssh/ssh_version msf auxiliary(ssh_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ssh_version) > set THREADS 256 msf auxiliary(ssh_version) > run
#BugBounty#bugbountytips#hacking#pentestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
detect the version of the target FTP server: msf > use auxiliary/scanner/ftp/ftp_version msf auxiliary(ftp_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ftp_version) > set THREADS 256 msf auxiliary(ftp_version) > run
#pentest#redteam#hacking#BugBounty#bugbountytipHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
dsourcher proslijedio/la je Tweet
#OSINT : Better Whois:http://www.betterwhois.com Active Whois:http://www.johnru.com ZabaSearch:http://www.zabasearch.com TinEye:http://www.tineye.com isearch:http://www.isearch.com/ serversniff:http://serversniff.net/ robtex:http://www.robtex.com#BugBountyTip#Hacking#pentestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
different ways to bypass Windows UAC: https://github.com/hfiref0x/UACME
#hacking#pentestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
1.Use
@signalapp instead of@WhatsApp 2.@ProtonMail instead of@gmail 3. Learn about encryption 4. Use@VeraCrypt_IDRIX for encryption. 5. Prefer Open Source apps 6. Update your apps regularly 7. Use 2-factor authentication#DataPrivacyDay2020Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
#OSINT DomainTools:http://www.domaintools.com Active Whois:http://www.johnru.com Domain Dossier:http://centralops.net Network Solutions:http://www.networksolutions.com DNSstuff:http://www.dnsstuff.com DNS-Digger:http://dnsdigger.com Shodan:http://www.shodan.io#bugbountytipHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
#OSINT : Built With:https://builtwith.com Google Dorks:https://www.exploit-db.com/google-hacking-database/ … Metagoofil:https://code.google.com/archive/p/metagoofil … Censys:https://censys.io/ URLScan:https://urlscan.io/ DNSStuff:https://www.dnsstuff.com/tools Netcraft:https://searchdns.netcraft.com#bugbountytips#redteam#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
#OSINT: theHarvester:https://github.com/laramies/theHarvester … Recon-ng:https://bitbucket.org/LaNMaSteR53/recon-ng … FOCA:https://github.com/ElevenPaths/FOCA … Discover:https://github.com/leebaird/discover … Spiderfoot:http://www.spiderfoot.net/ Sn1per:https://github.com/1N3/Sn1per SimplyEmail:https://github.com/SimplySecurity/SimplyEmail …#bugbountytips#redteam#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
There are some endpoints show JSON, but forget to set the header to “Content-type: application/json” and leave it as “Content-type: text/html” , and they show special chars , easy XSS ;)
#bugbountytip#bugbountytips#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
O Clube de Regatas do Flamengo lamenta profundamente o falecimento de
@kobebryant, astro da@nba e ídolo do@Lakers e da@usabasketball. Desejamos muita força aos familiares, amigos e fãs. Descanse em paz, lenda!

#CRF
: Stacy Revere / AFPpic.twitter.com/vXyrhUUiGz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
known&Zero-day Vulnerabilities: http://www.securityfocus.com http://www.xssed.com/ https://packetstormsecurity.com/ http://seclists.org/fulldisclosure/ http://0day.today/ https://www.exploit-db.com/ https://www.cvedetails.com http://cve.mitre.org https://nvd.nist.gov/ https://secuniaresearch.flexerasoftware.com/community/research …
#HackingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
#BugBountyTip time: I've got a RCE by using this tip: while testing for malicious file uploads, if .php extension is blacklisted you can try .PhP , .php5 and .php3 Sometime this fools the backend and you get shell! RTs & comments are appreciated. Follow#bugbountytips#pentestHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
#BugBountyTip time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on@Burp_Suite to do achieve this!#bugbountytips#infosec#hacking#pentest#pentesting#bugbounty RT and Follow, book coming!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
Voting is now open for the top 10 new web hacking techniques of 2019:https://portswigger.net/polls/top-10-web-hacking-techniques-2019 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
dsourcher proslijedio/la je Tweet
Ppl interested to learn about SSRF attacks
1. https://medium.com/bugbountywriteup/server-side-request-forgery-ssrf-testing-b9dfe57cca35 …
2. https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ …
3. https://hackerone.com/reports/115748
4. https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html …
5. https://geleta.eu/2019/my-first-ssrf-using-dns-rebinfing/ …
6. https://medium.com/@androgaming1912/gain-adfly-smtp-access-with-ssrf-via-gopher-protocol-26a26d0ec2cb …
7. https://medium.com/@w_hat_boy/server-side-request-forgery-ssrf-port-issue-hidden-approch-f4e67bd8cc86 …
8. https://medium.com/@armaanpathan/pdfreacter-ssrf-to-root-level-local-file-read-which-led-to-rce-eb460ffb3129 …
WriteupsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
generate PowerShell-based payloads for EthicalHacking: PowerSploit:https://github.com/PowerShellMafia/PowerSploit … PowerShell Empire:https://github.com/BC-SECURITY/Empire … Nishang:https://github.com/samratashok/nishang … PowerShell Obfuscator:https://github.com/danielbohannon/Invoke-Obfuscation …
#hacking#redteam#pentest#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
Antiforensics Techniques: -1-steganography -2-antirecovery -3-Encryption techniques -4-Online and offline anonymity -5-Attack the Forensic Tools -6-Attack the Investigators’ Work -7-Attack the Data
#forensics#CyberSecurity#hacking#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
dsourcher proslijedio/la je Tweet
-Automated enumeration tools: SpiderFoot:http://www.spiderfoot.net TheHarvester:http://www.edge-security.com/theharvester.php … Discover:https://github.com/leebaird/discover … Sn1per:https://github.com/1N3/Sn1per rapidscan:https://github.com/skavngr/rapidscan …
#OSINT#pentester#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
