Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @w1r3sh65rk
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @w1r3sh65rk
-
Anantkumar Joshi proslijedio/la je Tweet
I added a script to generate the PDF & archive for my
#OSCP Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.https://github.com/noraj/OSCP-Exam-Report-Template-Markdown …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Some
#bugbounty hunters made over €50.000 in bug bounties with this simple trick.
Thanks for the #BugBountyTip,@rez0__!pic.twitter.com/z9sPFJTNqV
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Unfurl : It takes a URL and expands ("unfurls") it into a directed graph, extracting every bit of information from the URL and exposing the obscured : https://dfir.blog/introducing-unfurl/ … cc
@_RyanBensonpic.twitter.com/tW9ZikSz8gHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Detecting tags/events on XSS exploitation, useful article (and tool) by
@leonishan_http://bit.ly/2TYv8nbHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
When you're brute forcing for endpoints, don't forget to add extensions. You can also use this method to discover backup files. Here's a command I use frequently: dirsearch -e php,asp,aspx,jsp,py,txt,conf,config,bak,backup,swp,old,db,sql -u <target>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'pic.twitter.com/RjRzccus5J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Privilege Escalation Cheatsheet for OSCP https://github.com/Ignitetechnologies/Privilege-Escalation …
#oscp#ctf#infosec#cheatsheetpic.twitter.com/1jUnUHybK3
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Microsoft Edge (And Internet Explorer) is the only browser that allows running JavaScript from a <script> without the end tag <script async src=data:,alert(1)>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Wrapping Up OWASP Mumbai's January Meetup with
@ravindra_09, Amol Podtar and@keyloggervk7. Thanks to our Chapter leaders@acc3ssp0int,@w1r3sh65rk and host@kkmookhey for providing the Network Intelligence India premises! See you all at the next meet!pic.twitter.com/qw41jAoHU1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Finding Hidden API Keys & How to Use Them https://community.turgensec.com/finding-hidden-api-keys-how-to-use-them/ … 来自
@turgensecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
2 FA Bypass https://link.medium.com/hDvuiOXDi3 https://link.medium.com/PE19FA9hc3 https://link.medium.com/o4WG060Di3 https://link.medium.com/Cm21UD1Di3 https://link.medium.com/b95OsX1Di3 https://link.medium.com/EZpU6n5Di3 https://link.medium.com/oSt1JF5Di3 https://link.medium.com/WRFcVX5Di3 https://link.medium.com/QeIuM5yk02 https://gauravnarwani.com/two-factor-authentication-bypass …
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
I found a really interesting Authorization bug on
@Hacker0x01. Bug:If user tries to access unauthorized endpoint, then he will get 403 error. but if he removes his cookies and access the endpoint with just CSRF_TOKEN header,he will get access to unauthorized info.#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Anantkumar Joshi proslijedio/la je Tweet
Google Dorks to Find Public Cameras inurl:currenttime inurl:top.htm inurl:/view.shtml inurl:"lvappl.htm" inurl:”CgiStart?page=” inurl:/view.shtml intitle:”Live View/ — AXIS” inurl:iview/view.shtml inurl:ViewerFrame?M0de= inurl:ViewerFrame?M0de=Refresh inurl:axis-cgi/jpg
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
#BugBountyTip When using#Nmap as part of your#Recon arsenal, make sure to add --data-length=50 {or any number in 20~60, the TCP packet header size). Otherwise, Nmap will in many cases return False Positives (i.e. too many open ports, or ports that are not actually open).#TBCPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
I just released some of my PoCs! IDOR: https://youtu.be/3hJaxmiSzO4 Stored XSS: https://youtu.be/pwLG7tAGO08 Stored XSS: https://youtu.be/fnW0w2VYT2I RXSS: https://youtu.be/IC43MzAkC7E RXSS: https://youtu.be/DZxMB_KOoMk RXSS: https://youtu.be/L5isQP28o3M RXSS: https://youtu.be/CaoAh2CXyr0
#GeneralEG#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
OWASP API Security Top 10 Vulnerabilities 2019
@owasp@apisecurityio https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm …pic.twitter.com/AFYAXGxxDY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Ppl interested to learn about SSRF attacks
1. https://medium.com/bugbountywriteup/server-side-request-forgery-ssrf-testing-b9dfe57cca35 …
2. https://www.shorebreaksecurity.com/blog/ssrfs-up-real-world-server-side-request-forgery-ssrf/ …
3. https://hackerone.com/reports/115748
4. https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html …
5. https://geleta.eu/2019/my-first-ssrf-using-dns-rebinfing/ …
6. https://medium.com/@androgaming1912/gain-adfly-smtp-access-with-ssrf-via-gopher-protocol-26a26d0ec2cb …
7. https://medium.com/@w_hat_boy/server-side-request-forgery-ssrf-port-issue-hidden-approch-f4e67bd8cc86 …
8. https://medium.com/@armaanpathan/pdfreacter-ssrf-to-root-level-local-file-read-which-led-to-rce-eb460ffb3129 …
WriteupsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.https://github.com/0xZ0F/Z0FCourse_ReverseEngineering …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anantkumar Joshi proslijedio/la je Tweet
Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)https://github.com/lgandx/Responder/releases/tag/v3.0.0.0 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.