Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @zseano
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zseano
-
Prikvačeni tweet
sorry to 2019 and here's to the new year and improving. 2020 .. the year you can all get your hands on my methodology :)https://medium.com/@zseano/sorry-to-2019-2020-lets-improve-hack-it-69e457f43808 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
can't even make up half the shit you experience in bugbounties lol wish it was simple as do research -> find vulnerabilities -> report -> get paid -> we're all happy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
things are awfully quiet over on
@Bugcrowd, last invite was almost 4months ago on October 9th :/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
Laugh of the morning :-)pic.twitter.com/rntaxkmj59
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
#writeup by@WeizmanGal $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)#BugBounty#infosechttps://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just a quick blog post: Easily leaking passenger information on a
@yeswehack program. Be careful what you share online! :) https://medium.com/@zseano/easily-leaking-passenger-information-on-an-airline-18f99b22cf95 …pic.twitter.com/Iq9IsQrqUs
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip#bugbountytip#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
zseano proslijedio/la je Tweet
When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
trillion dollar companyhttps://twitter.com/bdsams/status/1224360680213680129 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
manual hacking ftw. i knew today was going to be a good today ^_^ prob gonna find nothing for a few days now.. rip :(pic.twitter.com/Y3geltskKz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
Guy creates fake traffic jams on Google maps by walking a handcart with 99 phones lmao https://youtu.be/k5eL_al_m7Q pic.twitter.com/sJ5eCxoxQM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
We are going public with our some of the products in our
#bugbounty program@Hacker0x01. ~10 services will go from private -> public. This will be done gradually over the next two months. The program is now online at https://hackerone.com/visma Happy hacking!#togetherwehitharderpic.twitter.com/qUMA1RoTHaPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
good morning world! feeling hyped AF this monday, ready to get straight into hacking, lets get dem bugz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
joining Ben in 5 minutes:) come say hi!https://twitter.com/NahamSec/status/1224045678512365568 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Looking forward to chatting with
@NahamSec tonight! :)Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet



@zseano is joining me on my stream this Sunday and we have a lot to talk about. I’m excited to see what makes zseano’s approach so unique and how he looks for bugs when he’s hacking!pic.twitter.com/nUtQ4TUNuS
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
@yeswehack , what a pleasure meeting you all, awesome bunch of people!! Unexpectedly met@BitK_ aswell
pic.twitter.com/JR1GWcXlkR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
zseano proslijedio/la je Tweet
https://hazana.xyz/posts/escalating-reflected-xss-with-http-smuggling/ … this was a fun one :)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is a really good stream if you aren’t already watching check it out! https://twitch.tv/nahamsec https://twitter.com/NahamSec/status/1221525788802945026 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'pic.twitter.com/RjRzccus5J
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.