Ankit(Rudra16)

@rudra16t

Security Enthusiastic, N00b and Script Kiddie,Meme Lover, Community volunteer (Live,Love,Hack)😍😍

I don't know
Vrijeme pridruživanja: ožujak 2016.

Tweetovi

Blokirali ste korisnika/cu @rudra16t

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rudra16t

  1. Prikvačeni tweet
    26. pro 2019.

    1. Get my OSCP certificate. 2. Get a job in infosec. 3. Learn and deep dive into window reverse engineering. 4. Start playing CTF and with and 5. Start hunt on Desktop application(Windows) at . 1/2

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet

    Story of SSRF SSRF to admin access was like this-> 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .♥️ Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on admin

    Poništi
  3. proslijedio/la je Tweet

    Heyo All you liked stories of RCE and takeover Want more ? Thinking to upload daily one what you say ?

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Got a new CVE 😃 Title: phpList Authentication Bypass CVE ID: CVE-2020-8547 Vulnerability Type: PHP type Juggling / Loose Comparison

    Poništi
  5. proslijedio/la je Tweet
    prije 23 sata

    Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers: - Appsec & bug bounty hunter - Penetration tester and bug bounty hunter & Signup -

    Poništi
  7. prije 17 sati

    बुलाती है मगर जाने का नही, तेरी ip block है इधर आने का नहीं। P.S - Use VPN 😂😂

    Poništi
  8. prije 17 sati
    Poništi
  9. proslijedio/la je Tweet
    4. velj

    Hey ! If you're into coding, hacking, AppSec, NetSec, or any other sec (we don't judge).Come and learn something new things. Come join us on 9 February 2020 For more details :-

    Poništi
  10. proslijedio/la je Tweet
    4. velj
    Poništi
  11. proslijedio/la je Tweet
    4. velj

    Here is slide of talk on "A methodology using fuzzing and info disclosure"

    Poništi
  12. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  13. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  15. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    3. velj

    Today, we are launching , a series of interviews with hunters. In our first edition, we are discussing logic flaws and with ! 🐸 Who would you like to see interviewed next? Leave a comment! 👇

    Poništi
  17. 3. velj

    Join our chapter and meet with people from infosec and share knowledge 😍

    Poništi
  18. proslijedio/la je Tweet
    3. velj

    Hello everyone We are going to organize our second meetup on 9 Feb 2020 So what are you waiting for reserve your seats. Discord group: Rsvp us at meetup #owaspindore#opensecurityevent

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    This is my new finding. Many doesnot know about this bug so thought of doing writeup. Thanks to for his blog on BLH bug and for his blc tool.

    Poništi
  20. proslijedio/la je Tweet
    Odgovor korisnicima i sljedećem broju korisnika:

    The best thing I can suggest is if your having a bad day ! Just sleep for some time and when you wake up just pretend noting happened and start hunting again ❤️

    Poništi
  21. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·