Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @ngkogkos
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ngkogkos
-
Prikvačeni tweet
Just ate a well-known WAF for breakfast. <form><button formaction=javascript:top['ev'+'al'](self['\x61\x74\x6f\x62'](`YWxlcnQoMSk7`));// See picture for detailed explanation and tips.
#bugbounty#bugbountytip Kudos:@PortSwiggerRes,@brutelogic,@wugeej .pic.twitter.com/4Phkolgoso
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
#tips#bugbountytips If during your scans, the Backslash Powered Scanner plugin finds something like this. Try changing COM1 value for different numerical values, the result may surprise you. In this way I was able to extract registered users from an application.pic.twitter.com/3gW4vU10bQ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Do you have a big file w/ URLs w/ many of them being default pages, wildcards etc? Use
@TomNomNom's get-title hack to grep out common titles: cat urls.txt | get-title -c 300 > titles.txt cat titles.txt | grep -v "PATTERN" | awk -F '[()]' '{print $2}'#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
Give a man an open redirect, and you feed him for a day. Teach a man to chain open redirects with other bugs, and you feed him for a lifetime.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Awesome chain of bugs to
#RCE!https://twitter.com/HusseiN98D/status/1223951261831237632 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
It's a little different from what I thought. The overall function is similar to the taborator, but it may be useful if you are configuring the private collaborator. I think it's cool that the collaborator stays even after the session ends
cc) @ngkogkosPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
An Interesting Account Takeover:
#infosec#bugbountytips#BugBountyTip#hackerone#bugcrowd Credits:@fatratfatrat

pic.twitter.com/fPCoT5hV5W
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Nick || hunt4p1zza proslijedio/la je Tweet
Hey everyone, we are looking for speakers for this year. If you have any interesting topic to speak about and want to try how it feels to be on the stage just DM this account or shoot an email to any of CZ chapter leaders. RTs are appreciated.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
Practicing
#pentesting or#bugbounty on a daily basis? Based in in Europe? Don't miss the opportunity to take my Burp Suite Pro training in 2020, either in Geneva (March) or Amsterdam (April)https://www.linkedin.com/posts/agarri_training-mastering-burp-suite-pro-100-activity-6627540824735404037-BHk7/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
Did you know that the address '<a@b.com>c@d.com' when given to SES will send an email to a@b.com? this could lead to interesting exploit scenarios with some email parsing libraries/code https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -


What?!?! It also works in all modern browsers. https://twitter.com/PortSwiggerRes/status/1220298836431843328 …pic.twitter.com/TNw38uFpxP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
New blog post: A Less Known Attack Vector, Second Order IDOR Attackshttps://link.medium.com/okQ4s0yss3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I've been followed by
@Agarri_FR, my#infosec career is now fulfilled and I can retire
.pic.twitter.com/1P1SQvHlc9
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Nick || hunt4p1zza proslijedio/la je Tweet
Here's how the new Taborator feature works if my RT wasn't clear. If you send a request like: …http://sxt7ufpmvau5mq0l12ut2eqpigo6cv.burpcollaborator.net/?TaboratorCmd=comment:Chrome;bgColour:0x339933;textColour:0xffffff … This will colour the interaction green in Taborator and add a comment of Chrome and change the text colour to white.pic.twitter.com/iPnA24KxzA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I am thinking.. I need a password manager for my master passwords. Having split password databases with different master passwords for isolation reasons is not great when you realise you have to remember multiple complex passphrases that you may end up forgetting one day.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
To process JSON results output by ffuf you can use the jq tool. You can use a bash alias similar to below depending on your needs: alias jqffuf="jq -r '.results[] | [.url,.redirectlocation,.status,.length] | \"\(.[0]) -> \(.[1]) \(.[2]) \(.[3])\"'"
#bugbounty#bugbountytiphttps://twitter.com/ngkogkos/status/1218725174561968128 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
If you want to fuzz sequential numbers when looking for
#IDOR, you can easily do this with#ffuf. Here's a real (sanitised) example in bash: $ seq 1000 8000 | ffuf -u https://www.example.com/images/avatars/FUZZ.png … -o ffuf_idor.txt -v -w -#bugbounty#bugbountytipHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
.

To create a web app vuln scanning framework with