Pritesh Mistry

@ehpritesh

web application security researcher

Vrijeme pridruživanja: listopad 2017.

Tweetovi

Blokirali ste korisnika/cu @ehpritesh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ehpritesh

  1. Prikvačeni tweet
    20. pro 2019.

    I just published my writeup about How an incident gave us $$$ bounty. If you have any query feel free to DM me.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Poništi
  4. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  8. proslijedio/la je Tweet
    10. sij

    We just released the exploit for Remote Code Execution on Citrix Application Delivery Controller and Citrix Gateway (CVE-2019-19781)

    Poništi
  9. proslijedio/la je Tweet
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    Akamai WAF Bypass, worked on a recent program <x onauxclick=a=alert,a(domain)>click

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    Stream #4 is up on Youtube! These segments I call "Tool Time" and go through some new-ish bounty/appsec tradecraft + tools. Enjoy!

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    Here's a working POC for manually performing DNS Rebinding attack. 🙂 Some people asking me for this in DM.

    Poništi
  15. proslijedio/la je Tweet
    26. sij

    SpiderFoot 3.0 is now out! Major changes include: - Fully Python 3 - Target usernames - Run scans by CLI or web UI One minute DNS recon tutorial with the CLI:

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    There are some endpoints show JSON, but forget to set the header to “Content-type: application/json” and leave it as “Content-type: text/html” , and they show special chars , easy XSS ;)

    Poništi
  17. proslijedio/la je Tweet
    26. sij
    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Кто рано встаёт, тому Бог подаёт записать скоро )) Yes™

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    $40,000 Bugs Microsoft Edge (Chromium) - EoP via XSS to Potential RCE Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty ,

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

    Poništi
  21. proslijedio/la je Tweet
    25. sij

    Facebook rewarded me with a bounty of $30000 for SSRF on prod server (Internal Access 😎).

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·