PikaChu

@intx0x80

Security Researcher, Blue team by day , Red team by night

Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @intx0x80

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @intx0x80

  1. Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    prije 22 sata

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  4. Poništi
  5. proslijedio/la je Tweet
    prije 7 sati

    🔥 CVE-2019-18426 for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details:

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    "Dropbox often uses libcurl to make network requests which supports dozens of different protocols, not just HTTP and HTTPS" - [Dropbox didn't read our libcurl security man page]

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. velj

    HTTP Request Smuggling can allow attackers to get unauthorised access, compromise other users etc. It can also be a bug bounty cash cow for the right researcher. There aren't many write-ups that explain it in action, so here you go...

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Awesome CodeQL query from that detects many variants of LDAP Injections in Java: Plain Java JNDI, UnboundID, Spring LDAP and Apache LDAP API. We are pleased to award him our maximum bounty reward $3000

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    HTTP Smuggling : CVE-2020-8449 Squid Proxy 4.10 released with a security filter bypass and SSRF (host header manipulations).

    Poništi
  10. proslijedio/la je Tweet
    4. velj
    Poništi
  11. proslijedio/la je Tweet
    4. velj

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Poništi
  12. proslijedio/la je Tweet
    3. velj

    Easily monitor the exposure of your Kubernetes cluster using the kube-shodan project. It automatically syncs the external IPs with Shodan Monitor to help you keep track of what's exposed to the Internet:

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    RCE story Forbidden 2.HTTP header in request - Login page access 3. Sqli queries tried no success 4. Some recon on gitlab - Found base64 pwd - decrypt 5. Accessed admin panel 6. Admin panel customized - CLI available 7. File read successful

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  17. proslijedio/la je Tweet
    3. velj
    Poništi
  18. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    -2020-7799 FusionAuth RCE via Apache Freemarker Template

    Poništi
  20. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  21. proslijedio/la je Tweet
    1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·