Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @intx0x80
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @intx0x80
-
Prikvačeni tweet
car hacking part 1 https://github.com/jgamblin/CarHackingTools … (Tools) 1::https://github.com/jaredthecoder/awesome-vehicle-security … 2:https://github.com/ParrotSec/car-hacking-tools … 3-https://github.com/jopohl/urh 4:https://github.com/zombieCraig 5:https://github.com/schutzwerk/CANalyzat0r?fbclid=IwAR2mGQoq6o0vAx7BGPKK7kpMiTvxpeBENaQ73uRFM9VVJ0Oi7HX585VUs0s … 6:https://github.com/Hive13/CANiBUS 7:https://github.com/Hive13 8:https://github.com/mossmann/hackrf/releases/tag/v2018.01.1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
PikaChu proslijedio/la je Tweet
CVE-2019-18426 From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE Bounty: $12,500
#bugbounty https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
Airbnb
#bugbounty https://link.medium.com/eC4n4GTUN3 https://xpoc.pro/oauth-authentication-bypass-on-airbnb-acquisition-using-weird-1-char-open-redirect … https://www.arneswinnen.net/2017/06/authentication-bypass-on-airbnb-via-oauth-tokens-theft … https://buer.haus/2017/03/31/airbnb-web-to-app-phone-notification-idor-to-view-everyones-airbnb-messages/ … https://buer.haus/2017/03/13/airbnb-ruby-on-rails-string-interpolation-led-to-remote-code-execution/ … https://buer.haus/2017/03/09/airbnb-chaining-third-party-open-redirect-into-server-side-request-forgery-ssrf-via-liveperson-chat … https://buer.haus/2017/03/08/airbnb-when-bypassing-json-encoding-xss-filter-waf-csp-and-auditor-turns-into-eight-vulnerabilities …#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
CVE-2019-18426
#WhatsApp for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details: https://thehackernews.com/2020/02/hack-whatsapp-web.html?utm_source=social_share …#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
"Dropbox often uses libcurl to make network requests which supports dozens of different protocols, not just HTTP and HTTPS" - [Dropbox didn't read our libcurl security man page]https://blogs.dropbox.com/tech/2020/02/dropbox-bug-bounty-program-has-paid-out-over-1000000/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
HTTP Request Smuggling can allow attackers to get unauthorised access, compromise other users etc. It can also be a bug bounty cash cow for the right researcher. There aren't many write-ups that explain it in action, so here you go... https://www.pentestpartners.com/security-blog/http-request-smuggling-a-how-to/ …pic.twitter.com/Yko8tt1vrg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
Awesome CodeQL query from
@ggolawski that detects many variants of LDAP Injections in Java: Plain Java JNDI, UnboundID, Spring LDAP and Apache LDAP API. We are pleased to award him our maximum bounty reward $3000 https://github.com/Semmle/ql/pull/2651 …pic.twitter.com/wXJPh4ZwQ0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
HTTP Smuggling : CVE-2020-8449 Squid Proxy 4.10 released with a security filter bypass and SSRF (host header manipulations). http://lists.squid-cache.org/pipermail/squid-announce/2020-February/000110.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
PikaChu proslijedio/la je Tweet
Yet Another Sudo
#Vulnerability! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged#Linux &#macOS users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤ https://thehackernews.com/2020/02/sudo-linux-vulnerability.html?utm_source=social_share …#infosec#cybersecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
Easily monitor the exposure of your Kubernetes cluster using the kube-shodan project. It automatically syncs the external IPs with Shodan Monitor to help you keep track of what's exposed to the Internet: https://github.com/ekeih/kube-shodan …pic.twitter.com/Ja66pAc5mi
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
RCE story http://1.site.com/admin Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
A source code analyzer built for surfacing features https://github.com/microsoft/ApplicationInspector … Burp Bounty(a quick and simple way, to improve the active and passive scanner) https://github.com/wagiro/BurpBounty … Sublert is a security and reconnaissance tool https://github.com/yassineaboukir/sublert …
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. https://djangoproject.com/weblog/2020/feb/03/security-releases/ … FIX: https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 …pic.twitter.com/NljqLmin93
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
Exploiting Format Strings in Windowshttps://medium.com/bugbountywriteup/exploiting-format-strings-in-windows-5f96c9b29dea?source=rss----7b722bfd1b8d---4 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by
@qualys You can find it here: https://github.com/0xdea/exploits/blob/master/openbsd/raptor_opensmtpd.pl …#opensmtpd_too_openpic.twitter.com/q1ykEhz7vh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
#CVE-2020-7799 FusionAuth RCE via Apache Freemarker Templatepic.twitter.com/QGc3cuCiZ7Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
Windows 10 UAC bypass for all executable files which are autoelevate true.https://github.com/sailay1996/UAC_Bypass_In_The_Wild …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
PikaChu proslijedio/la je Tweet
I just got a fancy idea to create strings in
#javascript without using dangerous characters
Inspired by @garethheyes challenge from@WebSecAcademy.#bugbountytips#xsspic.twitter.com/GiAe0REwLI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.