Tweetovi

Blokirali ste korisnika/cu @kl_sree

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kl_sree

  1. proslijedio/la je Tweet

    2019 has been a record-breaking year on lots of fronts - thanks to you all! Keep up your awesome discoveries.

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    23. sij

    This blind XXE technique for out-of-band exfiltration was one of the core use cases we had in mind when developing Burp Collaborator:

    Poništi
  4. proslijedio/la je Tweet
    19. sij

    I have made a demo application to abuse Google Chrome cache by exploiting CORS. The code is big messy but it works. Original research was from Reviews are appreciated :-)

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    DNS Rebinding attack in one Screenshot. 🙂

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    "Hey the app keeps crashing, what should we do?" "Just put 'Display not in use' on the desktop wallpaper"

    Poništi
  8. proslijedio/la je Tweet
    20. sij
    Poništi
  9. proslijedio/la je Tweet
    20. sij
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    I just published Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$

    Poništi
  11. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. sij

    Voting is now open for the top 10 new web hacking techniques of 2019:

    Poništi
  13. proslijedio/la je Tweet

    CVE-2017-18638: A module I submitted to for detecting a vulnerability in Graphite is now live! Here's 's original writeup about exploiting this vuln as part of an exploit chain for a $12,500 Bug Bounty from

    Poništi
  14. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  15. proslijedio/la je Tweet
    10. sij
    Poništi
  16. proslijedio/la je Tweet
    8. sij

    This bug, fixed in latest Firefox, led to pretty interesting research, how you can exfiltrate data in Firefox with a single injection point (ie. no reloading iframes). I’m going to publish the trick soon.

    Poništi
  17. proslijedio/la je Tweet
    8. sij

    New Writing Bypass SameSite Cookies Default to Lax and get CSRF Looking at a new Chrome feature and the 2 minute quirk which make it possible to bypass it, also solution to my CSRF challenge.

    Poništi
  18. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    7. sij

    For the sake of exercising, I looked up some web challenges in a and noticed a cool SQLi one "Secure System". I discovered some cool stuff that you will not find it in tutorials so check it out! 😅

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    8. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·