Evan   

@evanricafort

will pWn for burger & fries. 🍔🍟 / & / ig: evanricafort

Ipil, Zamboanga Sibugay  
Vrijeme pridruživanja: studeni 2013.
Rođen/a 3. siječnja 1996.

Tweetovi

Blokirali ste korisnika/cu @evanricafort

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @evanricafort

  1. Prikvačeni tweet
    Poništi
  2. proslijedio/la je Tweet

    2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Give a man an open redirect, and you feed him for a day. Teach a man to chain open redirects with other bugs, and you feed him for a lifetime.

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    Quickly get the ASN of an IP address, along with the associated company name and location: curl <ip> This is a great way to confirm ownership of an IP/domain. It also is a great way to services that might be in use (AWS/Azure/Cloudfront/Akamai, etc.)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  7. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  8. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Cloudflare XSS Bypass <a"/onmouseover=(confirm)('clodflare-bypass-doskey_history')>click

    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Poništi
  11. Someone is trying to use my email address to register HitBTC account. mannnnn... create some dummy or use some dummy account for your testing :p

    Poništi
  12. proslijedio/la je Tweet
    29. sij
    Poništi
  13. proslijedio/la je Tweet
    28. sij

    The bigger you become, the more people that will try to bring you down. Ignore the toxicity as it is merely a reflection of those people themselves.

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    I always had a hard time finding writeups beacuse they were all over the place in different blog posts, so I made this. If you know of something that is not in there, you are more than welcome to contribute! 🎉

    Poništi
  15. Poništi
  16. Poništi
  17. Poništi
  18. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  19. Not a Bball fan but rest in paradise to this legend! 🙏🏻

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    One of the cooler bugs we ( ) found in 2019 would definitely be the CSTI->XSS->RCE chain in EA's Origin client :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·