Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @niksthehacker
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @niksthehacker
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
nikhil proslijedio/la je Tweet
New blog post: Simple Remote Code Execution Vulnerability Examples for Beginnershttps://link.medium.com/qEZHJHzNP3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.pic.twitter.com/AKk4dI4NMU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE" https://jatindhankhar.in/blog/responsible-disclosure-breaking-out-of-a-sandboxed-editor-to-perform-rce/ …pic.twitter.com/E7VBsoJwdY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Here is slide of
@fransrosen talk on "A methodology using fuzzing and info disclosure"https://www.slideshare.net/bsidesahmedabad/frans-rosn-keynote-at-bsides-ahmedabad …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Hey bug hunters! Want a look at some of the top vulnerabilities ever found on
@Dropbox ? They just released the last blog post I wrote before leaving. Enjoy!#bugbountytipshttps://blogs.dropbox.com/tech/2020/02/dropbox-bug-bounty-program-has-paid-out-over-1000000/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.https://blog.assetnote.io/bug-bounty/2020/02/01/expanding-attack-surface-react-native/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Just in case you haven’t seen the details yet, here it is https://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/ … it is always good to run code on a SharePoint server :)https://twitter.com/irsdl/status/1218304963971035136 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.
#bugbounty#ctfhttps://blog.shoebpatel.com/2020/01/31/Facebooks-BountyCon-2020-CTF-Writeup/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Akamai WAF Bypass, worked on a recent
#bugbounty program#xss <x onauxclick=a=alert,a(domain)>clickHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Call to security researchers, bug bounty hunters, and security enthusiasts. Bharti Airtel is organizing an invite-only bug bounty event. Please follow the below link for registration. https://form.jotform.com/200273599522053
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
@ngalongc,@EdOverflow, and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover. https://blog.reconless.com/samesite-by-default/ …pic.twitter.com/5R23YmpksT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Hola everyone! The last date to submit call for nominations is 7th Feb, do submit your bugs to win amazing Prizes like Xbox, hak5 gear, 1-year PentesterLab subscription and bug bounty village unique swags.https://bit.ly/38igUS8 .
@Owaspseasides#bugbounty#bugbountyvillagepic.twitter.com/krESDkVff0Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Episode #2 - We sit down with
@0xacb to talk about how to be successful in bug bounty, live events, music and creativity and of course, how to reach cosmic brain level 10. Listen on https://anchor.fm/bugbountypodcast/episodes/Episode-2-ft--0xacb-eah46a …#bountylife#bugbounty#bugbountypodcast#bugbountytip#bbpPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Hacker tip: when you’re looking for IDORs in a model that references another model, try storing IDs that don’t exists yet. I’ve seen a number of times now that, because the model can’t be found, the system will save the ID. (1/2)
#TogetherWeHitHarderPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
One more: Find a subdomain such as <grafana>.corp.company.com which points to a external IP example however only accessible inside VPN and such SSRF could be leveraged in that way. You can often find such hosts over SSL. Have exploited such in pasts. Might even be a
#bugbountytip https://twitter.com/jobertabma/status/1222264580329488385 …pic.twitter.com/BVA99w6ios
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
Thoughts: - try specifying the port to see if 80 still responds to SSL traffic - see if you can find validation issues, e.g. https://x<new line>http://localhost - leverage a redirect to downgrade - try redirecting to file://, |ls, or gopher:// - inject headers for cache poisoning
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
nikhil proslijedio/la je Tweet
SVG animate XSS vector by
@garethheyeshttps://portswigger.net/research/svg-animate-xss-vector …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
