Tweetovi

Blokirali ste korisnika/cu @pspaul95

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pspaul95

  1. proslijedio/la je Tweet

    Confirmed! , , and from the Horst Goertz Institute for IT-Security () used an OOB access to gain code execution on the Rockwell Automation HMI. They earned themselves $25,000 and 25 points toward Master of Pwn.

    Poništi
  2. proslijedio/la je Tweet

    Success! was able to get RCE on the Rockwell Automation FactoryTalk View SE in the HMI category. He's off to the disclosure room to detail how he popped calc.

    Poništi
  3. proslijedio/la je Tweet
    27. pro 2019.

    My "simple" XSS challenge is over! Once again congratz to and for solving it! But also to everyone else that tried their best. Have you found all 11 vulnerabilities? 💪

    Poništi
  4. proslijedio/la je Tweet
    9. pro 2019.

    We just got 2nd place in as FluxRepeat. Thanks for the awesome challenges and the participating members across , and . With the price money we will make sure to enable some conferences and CTFs. :-)

    Poništi
  5. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    10. stu 2019.

    2019 is over - turns out you can selectively block subresources if you have HTML injection by using link preload with the integrity attribute:

    Poništi
  7. proslijedio/la je Tweet
    21. lis 2019.

    Had no clue about this, as of Python 3.5 you can bundle an entire application into a ZipFile (with a .pyz extension) and execute it directly. This is the equivalent of Java .jar files for Python

    Poništi
  8. proslijedio/la je Tweet
    30. lis 2019.

    I created a TLS challenge (Evil Corp) for the 4future CTF at . Only one team was able to solve it, so I created a writeup of the intended solution. CC:

    Poništi
  9. 27. lis 2019.
    Prikaži ovu nit
    Poništi
  10. 27. lis 2019.

    I just published the source for "Save Our Planet", a hard XSS challenge from CTF 2019! I won't do a whole writeup for this one, but my reference exploit is highly commented, so I hope that is enough. If you have questions, DM me!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    25. lis 2019.

    I was asked about a writeup for the "Open Pit" challenge from so I went ahead and wrote one.

    Poništi
  12. proslijedio/la je Tweet
    25. lis 2019.

    Hi! I've created my very first "simple" XSS challenge . I crafted it as a result of my recent research that I have been doing for the past weeks 😺 Can you solve it? 💪

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. lis 2019.

    These are my two solutions to ctf challenges in the form of commented payloads. Very interesting problems, wish the team had time to play :(

    Poništi
  14. proslijedio/la je Tweet
    24. lis 2019.

    CTF has now concluded. Congratulations to team wecaneat5hamburgersatonce for first place, dcua for second and #71 for third. It was an awesomely tight race! Only one challenge remained unsolved. We hope you all enjoyed the CTF!

    Poništi
  15. proslijedio/la je Tweet
    23. lis 2019.

    First Blood on Do You Even XSS? by !!! Amazing job 🥳

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. lis 2019.

    The CTF has started. 🎉🎉🎉 Good luck! You can still register here

    Poništi
  17. proslijedio/la je Tweet
    20. lis 2019.

    Are you scared of XSS 🎃☠️🕸🧟‍♀️? Then DO NOT join  CTF this week.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    15. lis 2019.

    Registration for the CTF 2019 is finally open! 🎉🎉🎉 Time to register your team now!

    Poništi
  19. 7. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    26. ruj 2019.

    Hey! I recently crafted a surprising payload when solving XSS Challenge on Twitter and wrote a whole article about my findings. “𝘊𝘭𝘰𝘣𝘣𝘦𝘳𝘪𝘯𝘨 𝘵𝘩𝘦 𝘤𝘭𝘰𝘣𝘣𝘦𝘳𝘦𝘥 — 𝘈𝘥𝘷𝘢𝘯𝘤𝘦𝘥 𝘋𝘖𝘔 𝘊𝘭𝘰𝘣𝘣𝘦𝘳𝘪𝘯𝘨” Hope you like it!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·