Karna

@karna__1

IT guy by day, noob hacker by night = Hacking | Developing | Knowledge | Adrenaline Rush | Music | ANIME | Wisdom | Humans 💙

InterNET
Vrijeme pridruživanja: listopad 2011.

Tweetovi

Blokirali ste korisnika/cu @karna__1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @karna__1

  1. Prikvačeni tweet
    24. pro 2019.

    I heard that making goals will help you focus a lot. So here's mine: 1. Get triages on at least 10 crits. 2. Make 2500+ Reputation on . 3. Make more HACKER friends. I hope I'm not 'all talk no action' 😂 Go list your goals now! Happy 2020 ❤

    Poništi
  2. proslijedio/la je Tweet
    30. ruj 2016.

    Mobile Application Reverse Engineering and Analysis Framework -

    Poništi
  3. proslijedio/la je Tweet
    prije 3 sata

    We are looking for a Mobile Security Analyst to join our team at ! If you (or someone you know) are interested in this position feel free to DM me or apply here:

    Poništi
  4. proslijedio/la je Tweet
    prije 19 sati

    I just published Hijacking shared report links in Google Data Studio

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Leaking support inbox of identity confirmation process between Facebook and political advertisers By Bounty: $5000

    Poništi
  7. proslijedio/la je Tweet
    4. velj

    CVE-2019-18426  
From Persistent-XSS in Whatsapp to Reading from the File System on Mac/Windows with a potential for RCE

Bounty: $12,500




    Poništi
  8. proslijedio/la je Tweet
    3. velj

    My writeup for H1-415 CTF. Again, hope that you enjoy it. :) Thanks,

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    Here is slide of talk on "A methodology using fuzzing and info disclosure"

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  12. proslijedio/la je Tweet
    4. velj
    Poništi
  13. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Alhamdulillah. Just got my first RCE in 2020 at . Tips: When you can't execute one liner reverse shell on your web shell (because some char was blocked), then try to download those shell to server and execute it via your web shell. style. ماشاءالله

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. velj

    Bracket: Simple tool to find the HTML Comments of a site.

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    Today's study session 👩🏽‍💻💗 - Studying x86 Assembly(It has been a bit tedious not gonna lie) Sometimes I feel stupid lol - Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into. Does anyone have any Binary Exploitation exercises?

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    Odgovor korisnicima

    I also write a small script for making .bundle files more readable. I hope it helps.

    Poništi
  18. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  20. proslijedio/la je Tweet
    26. lis 2019.

    Scored my first bounty today on . Thank you . Your work and notes have helped me to achieve this.

    Poništi
  21. 1. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·