I get request for tips for getting started in bounty hunting- so I group an answer here. This is what have worked for me and my primary focus is on Windows and filesystems. An area that I think is underrated as there is explosion in minifilters that have to all interact securely
-
Show this thread
-
Files are relevant for many security sceneraios and NTFS is often poorly understood. I recommend thinking up edge cases, what would happen if? Then test and see if it is exspected. Read about obscure edge cases- read disassebly , look at NTFS.sys
2 replies 3 retweets 35 likesShow this thread
Read everything by james forshaw- many times. See all hes videos- he invented most classes of logic exploits. Learn DACL,Oplocks,junction folders,symlink at the NT api level. Use filetest and procmon- I can play with filetest for hours
3:54 AM - 14 Jul 2020
0 replies
6 retweets
74 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.