Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @rudra16t
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rudra16t
-
Prikvačeni tweet
#2020Goals#BugBounty2020Goals 1. Get my@offsectraining OSCP certificate. 2. Get a job in infosec. 3. Learn and deep dive into window reverse engineering. 4. Start playing CTF and with@hackthebox_eu and@VulnHub 5. Start hunt on Desktop application(Windows) at@Hacker0x01. 1/2https://twitter.com/Hacker0x01/status/1210207048685817856 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Story of SSRF SSRF to admin access http://1.Target was like this-> http://Site.com/users/view/data?uri= … 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .
Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on adminHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Heyo All you liked stories of RCE and takeover Want more ? Thinking to upload daily one what you say ?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Got a new CVE
Title: phpList Authentication Bypass
CVE ID: CVE-2020-8547
Vulnerability Type: PHP type Juggling / Loose Comparisonpic.twitter.com/WItl6yENRoHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.pic.twitter.com/AKk4dI4NMU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Hackers from Indore and nearby location, there is an IBH regional meet coming up. Organizers:
@rootxharsh - Appsec@Vimeo & bug bounty hunter@Hacker0x01@ahm3dsec - Penetration tester and bug bounty hunter@cobalt_io &@synack Signup - http://meetu.ps/c/4xGLn/FNsMn/d#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
बुलाती है मगर जाने का नही, तेरी ip block है इधर आने का नहीं। P.S - Use VPN

Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Ankit(Rudra16) proslijedio/la je Tweet
Hey
#Indore ! If you're into coding, hacking, AppSec, NetSec, or any other sec (we don't judge).Come and learn something new things. Come join us on 9 February 2020 For more details :- https://www.meetup.com/OWASP-Indore-Chapter/events/268359168/ …#CyberSecurity#Hackers#owasp#indore#defcon#infosec#meetupHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Let's go and learn something new things From
@53cr353arch3r#owasp#meetup#CyberSecurityhttps://twitter.com/OwaspIndore/status/1224712589168594947 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Here is slide of
@fransrosen talk on "A methodology using fuzzing and info disclosure"https://www.slideshare.net/bsidesahmedabad/frans-rosn-keynote-at-bsides-ahmedabad …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them. https://medium.com/@inonst/31-tips-api-security-pentesting-480b5998b765 …
#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo(http://github.com/site/ ) 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like http://github.com/site/ Successful takeover
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Today, we are launching
#BugBusiness, a series of interviews with#BugBounty hunters. In our first edition, we are discussing logic flaws and@securitytxt with@EdOverflow !
Who would you like to see interviewed next? Leave a comment!
http://go.intigriti.com/bugbusiness-1 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Join our chapter and meet with people from infosec and share knowledge
#owasp#indore#infosec#security#bugbountyhttps://twitter.com/OwaspIndore/status/1224287594680217600 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
Hello everyone We are going to organize our second meetup on 9 Feb 2020 So what are you waiting for reserve your seats. Discord group:https://discord.gg/fETNeeQ Rsvp us at meetup https://www.meetup.com/OWASP-Indore-Chapter/events/268359168/ … #owaspindore#opensecurityevent
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
This is my new finding. Many doesnot know about this bug so thought of doing writeup. Thanks to
@EdOverflow for his blog on BLH bug and@stevenvachon for his blc tool.#bugbountytips#infosec#bugbounty#bugcrowdhttps://medium.com/@bathinivijaysimhareddy/how-i-takeover-the-companys-linkedin-page-790c9ed2b04d …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
The best thing I can suggest is if your having a bad day ! Just sleep for some time and when you wake up just pretend noting happened and start hunting again
pic.twitter.com/V7O5r82vHaHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ankit(Rudra16) proslijedio/la je Tweet
WooT! There is always a way. New
#bugbounty#pentest short write up! Chain the bugs till you get what you want.#bugbountytip#bugbountytips#hacking Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:)
pic.twitter.com/nlAv4pMPhx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.