Tweetovi

Blokirali ste korisnika/cu @what000if

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @what000if

  1. proslijedio/la je Tweet
    2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  3. Poništi
  4. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    -2020-7799 FusionAuth RCE via Apache Freemarker Template

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  7. proslijedio/la je Tweet

    »_ everything is not as it seems. 🎃 «input»; p=-alert(1)}//\ * var n = {a: "-alert(1)}//\", b: "-alert(1)}//\"}; «input»; p=\&q=-alert(1)// * var n = {a: "\", b: "-alert(1)}//"};

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    I published another blog today. This is a story about an interesting SQL Injection I found. “A Not-So-Blind RCE with SQL Injection” by Prashant Kumar

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Steps 0) Login in with Twitter 1) Host Header Injection [to a.cxx] 2) Generate OAuth Token's Link 3) Send link to Victim, after victim authorize 4) Verifier send to a.cxx 5) Reuse use token Account Takeover by

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  11. proslijedio/la je Tweet
    30. sij
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    Wow! "Resources for Beginner Bug Bounty Hunters" has over 1000 stars on GitHub now and we just pushed a new update! Check it out:

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    I've been beta testing this update for a while, it's a good one :)

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Some hunters made over €50.000 in bug bounties with this simple trick. 🤑 Thanks for the , !

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. sij
    Poništi
  16. Poništi
  17. proslijedio/la je Tweet
    20. sij

    Directory Listings --> JS files --> Hidden Endpoints --> Endpoints contains hidden parameters --> Playing with, got Server Errors --> Found Apache Solr version 6.0.0 --> Found Vulnerable --> Public POC --> Got RCE :)

    Poništi
  18. proslijedio/la je Tweet

    Learn how an authenticated RCE vulnerability in < 5.2.4 allows attackers to bypass hardening mechanisms. Read more ->

    Poništi
  19. proslijedio/la je Tweet
    23. sij

    I once got 90% of a critical vulnerability in Mozilla Persona's password reset. 8 years later, it still hurts that I didn't complete it. Has anyone ever successfully exploited SMTP injection via the Reply-To+Eicar technique or similar non-CC methods?

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    Hacker tip: when you’re looking for IDORs in a model that references another model, try storing IDs that don’t exists yet. I’ve seen a number of times now that, because the model can’t be found, the system will save the ID. (1/2)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·