Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @iamnoooob
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @iamnoooob
-
Prikvačeni tweet
I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Rahul Maini proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -

got so frustrating in the end but we were just one char away.https://twitter.com/rootxharsh/status/1215717566305325056 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
I just published "Hunting Good Bugs with only <HTML>" https://link.medium.com/oTrMsKEM72
#bugbounty#infosec I hope you enjoy this post!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.
#CSRF#SameSitehttps://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
For the sake of exercising, I looked up some web challenges in a
#tetctf and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out!
https://medium.com/@terjanq/blind-sql-injection-without-an-in-1e14ba1d4952 …
#ctf#bugbountytips#sqlPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC!
https://www.allysonomalley.com/2020/01/06/saying-goodbye-to-my-favorite-5-minute-p1/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process. https://blog.jmpesp.org/2020/01/fuzzing-php-with-domato.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.https://leucosite.com/Edge-Chromium-EoP-RCE/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
"Hey la Kibana, Inspection des gadgets !"
Pwning Kibana 6.2 using prototype pollution and CVE-2018-17246 by @_mabote_ https://www.synacktiv.com/posts/pentest/pwning-an-outdated-kibana-with-not-so-sad-vulnerabilities.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Rahul Maini proslijedio/la je Tweet
Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437 … Reported through
@Hacker0x01 ;)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet

we are #announcing our long awaited project for the community http://projectdiscovery.io , it’s a cloud based platform for continuous recon and monitoring, please have a look on product video and blog and give a thought about it. https://medium.com/@projectdiscovery/reconnaissance-the-way-it-should-be-edb44accc77 …https://www.youtube.com/watch?v=xxV-wSFCREA …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: https://www.hackmanit.de/en/blog-en/82-xml-signature-validation-bypass-in-simplesamlphp-and-xmlseclibs … (CVE-2019-3465) // cc
@hackmanitpic.twitter.com/ORzZfGcdJt
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
Slides and video of my
#bluehatseattle talk "A year of hacking Azure AD" are online! Contains my exploration of the unofficial "1.61-internal" version of the Azure AD graph and the resulting vulnerabilities
Slides: https://dirkjanm.io/talks/
Video:https://www.youtube.com/watch?v=fpUZJxFK72k …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
Here is an interesting find and the root cause analysis of an Arbitrary file read vulnerability discovered by me in
@PhantomJS https://www.darkmatter.ae/blogs/breaching-the-perimeter-phantomjs-arbitrary-file-read/ … Note to Devs, never download user controllable HTML locally for converting it in to PDF or PNG if you are using PhantomJs.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
Slides from my
#Hacktivity2019 talk, including HTTP smuggling techniques via fake WebSocket connectionhttps://www.slideshare.net/0ang3el/whats-wrong-with-websocket-apis-unveiling-vulnerabilities-in-websocket-apis …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Rahul Maini proslijedio/la je Tweet
A Tale of Exploitation in Spreadsheet File Conversions - Researching exploitation in headless document conversion in LibreOffice w/
@erbbysam,@Smiegles,@Daeken https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/ …pic.twitter.com/lwPkzfwRy0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
well, It includes various other well written references. Credit where credit's due!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
guys!
