Rudra Sarkar  

@rudr4_sarkar

Synack Red Team Member • Infosec • Security Engineer at

  Bangladesh
Vrijeme pridruživanja: srpanj 2016.

Tweetovi

Blokirali ste korisnika/cu @rudr4_sarkar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rudr4_sarkar

  1. Prikvačeni tweet
    Poništi
  2. 5. velj

    Is anyone who can help me to patch AWS S3 bucket?

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Happy to work with our and their initiaves when we can to move the industry forward. Best of luck on your conference … =)

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    just curious, how do most people test for blind xxe?

    Poništi
  5. proslijedio/la je Tweet
    31. sij
    Poništi
  6. 31. sij

    A Not-So-Blind RCE with SQL Injection by

    Poništi
  7. proslijedio/la je Tweet

    »_ everything is not as it seems. 🎃 «input»; p=-alert(1)}//\ * var n = {a: "-alert(1)}//\", b: "-alert(1)}//\"}; «input»; p=\&q=-alert(1)// * var n = {a: "\", b: "-alert(1)}//"};

    Poništi
  8. 29. sij
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    even though the jenkins was patched there were still build sources and other stuff including password ,etc. some directories were /build/ /downloads/ /images/ /testing/

    Poništi
  10. proslijedio/la je Tweet
    25. sij

    Digital Ocean Bucket Takeover:- format: bucketname[.]region[.]digitaloceanspaces[.]com In Console:- Create Space, type the bucket name, make it public :) How to find? site:github[.]com intext:digitaloceanspaces[.]com

    Poništi
  11. proslijedio/la je Tweet
    21. sij

    time: when you see a POST request made with JSON, convert this to XML and test for XXE. You can use "Content-type converter" extension on to do achieve this! RT and Follow, book coming!

    Poništi
  12. 22. sij

    after semester break 😁

    Poništi
  13. proslijedio/la je Tweet
    20. sij

    When u sleep just 2 hours in order to get up and finish a Pentesting Report. Finished earlier then expected! Trying to figure out now, how to sleep again🤯🤯

    Poništi
  14. proslijedio/la je Tweet
    18. sij
    Poništi
  15. 15. sij
    Poništi
  16. proslijedio/la je Tweet
    10. sij

    I just published "Hunting Good Bugs with only <HTML>" I hope you enjoy this post!

    Poništi
  17. proslijedio/la je Tweet
    6. sij

    CSRF Bypasses: 1. Check if there is any CSRF token in request, if yes, remove token and send request, is it bypassed? Modify the CSRF token to any other CSRF token, Check if CSRF token is matched with any cookie token, if yes, you can bypass this.

    Prikaži ovu nit
    Poništi
  18. 5. sij
    Poništi
  19. 5. sij
    Poništi
  20. proslijedio/la je Tweet
    4. sij

    Print all git repos from a user curl -s <username>/repos?per_page=1000 | grep -oP '(?<="git_url": ").*(?="\,)'

    Poništi
  21. proslijedio/la je Tweet
    27. pro 2019.

    After reading this report …… it compels me to think that ,,, bug bounties do take a lot of weightage when it comes to luck.... 😅

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·