Tweetovi

Blokirali ste korisnika/cu @infosec_au

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @infosec_au

  1. proslijedio/la je Tweet
    prije 17 sati

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  2. 2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Here are my (updated) slides from for my talk "Owning The Cloud Through SSRF & PDF Generators" with Chris Holt from . Big thank you to , , , , , and !

    Poništi
  5. proslijedio/la je Tweet
    11. sij

    This is definitely a serious one we are seeing it pop up all over the place, please make sure to implement the mitigation’s as soon as you can -

    Poništi
  6. proslijedio/la je Tweet
    11. sij

    It’s been great watching and participating in the race to CVE-2019-19781. All of our customers have been covered by this check for the last few days.

    Poništi
  7. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    The top 10 web hacking techniques of 2019 has some new contenders, thanks to community nominations. Keep them coming!

    Poništi
  9. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  11. 24. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  13. 7. pro 2019.
    Poništi
  14. 23. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    30. ruj 2019.

    Omg. Telstra enabled calling payphones and they put the number on em! And they ring! 😍

    Poništi
  16. proslijedio/la je Tweet
    26. ruj 2019.
    Poništi
  17. proslijedio/la je Tweet
    26. ruj 2019.

    CVE-2019-16276: HTTP Request Smuggling in Golang

    Poništi
  18. 24. ruj 2019.
    Poništi
  19. proslijedio/la je Tweet
    12. ruj 2019.

    I joined 35 awesome hackers and hacked on for 9 hours which resulted in total payouts of $375.000 good times!

    Poništi
  20. proslijedio/la je Tweet
    5. ruj 2019.

    Blogged! I analyzed the new portal <portal> element in Chrome a few months ago and it resulted in a few interesting bugs, including SOP bypass and arbitrary file read in Chrome ($10k bounty)! Write up: CC:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·