Rahul Maini

@iamnoooob

Security Engineer | | | | | OSCP | Author at SecurityIdiots

\\domain\ADMIN$
Vrijeme pridruživanja: studeni 2014.
Rođen/a 8. veljače 1998.

Tweetovi

Blokirali ste korisnika/cu @iamnoooob

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @iamnoooob

  1. Prikvačeni tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  2. 16. sij
    Poništi
  3. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  4. 10. sij

    🌜🌜got so frustrating in the end but we were just one char away.

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    I just published "Hunting Good Bugs with only <HTML>" I hope you enjoy this post!

    Poništi
  6. proslijedio/la je Tweet
    8. sij

    New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    For the sake of exercising, I looked up some web challenges in a and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out! 😅

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  9. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  11. proslijedio/la je Tweet
    20. pro 2019.

    "Hey la Kibana, Inspection des gadgets !" 😋 Pwning Kibana 6.2 using prototype pollution and CVE-2018-17246 by

    Poništi
  12. 17. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    13. pro 2019.

    Hi, If you want to know how SSRF Vulnerability was exist in Vimeo, you should read: Reported through ;)

    Poništi
  14. proslijedio/la je Tweet
    14. stu 2019.

    🎉🎉we are our long awaited project for the community , it’s a cloud based platform for continuous recon and monitoring, please have a look on product video and blog and give a thought about it.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    7. stu 2019.

    After a longer time, we had again a look at SAML...resulted in a complete signature bypass in SimpleSAMLphp and xmlseclibs, and my coolest (public) Signature Wrapping exploit. Please patch. Writeup: (CVE-2019-3465) // cc

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    6. stu 2019.

    Slides and video of my talk "A year of hacking Azure AD" are online! Contains my exploration of the unofficial "1.61-internal" version of the Azure AD graph and the resulting vulnerabilities😃 Slides: Video:

    Poništi
  17. proslijedio/la je Tweet
    5. stu 2019.

    Here is an interesting find and the root cause analysis of an Arbitrary file read vulnerability discovered by me in Note to Devs, never download user controllable HTML locally for converting it in to PDF or PNG if you are using PhantomJs.

    Poništi
  18. proslijedio/la je Tweet
    25. lis 2019.

    Slides from my talk, including HTTP smuggling techniques via fake WebSocket connection

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    18. lis 2019.

    A Tale of Exploitation in Spreadsheet File Conversions - Researching exploitation in headless document conversion in LibreOffice w/ , ,

    Poništi
  20. 16. lis 2019.

    well, It includes various other well written references. Credit where credit's due!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·