zseano 

@zseano

Web application security researcher / hacker. Currently focused on bug bounty programs & training companies how to hack themselves. Perhaps I can teach you? :)

UK
Vrijeme pridruživanja: veljača 2012.

Tweetovi

Blokirali ste korisnika/cu @zseano

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zseano

  1. Prikvačeni tweet
    1. sij

    sorry to 2019 and here's to the new year and improving. 2020 .. the year you can all get your hands on my methodology :)

    Poništi
  2. prije 3 sata

    can't even make up half the shit you experience in bugbounties lol wish it was simple as do research -> find vulnerabilities -> report -> get paid -> we're all happy

    Poništi
  3. prije 7 sati

    things are awfully quiet over on , last invite was almost 4months ago on October 9th :/

    Poništi
  4. proslijedio/la je Tweet

    Laugh of the morning :-)

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    by $12,500 USD Read From The File System Access (potencial RCE) on Whatsapp Desktop (electron)

    Poništi
  6. 4. velj

    Just a quick blog post: Easily leaking passenger information on a program. Be careful what you share online! :)

    Poništi
  7. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  8. proslijedio/la je Tweet
    4. velj
    Poništi
  9. proslijedio/la je Tweet
    4. velj

    When testing for SSRF using a black list, take internal IP addresses and when encoding them, dont encode entire IP. Encode 1 octet of the IP address, or 2 or 3. For Instance: AWS Metadata - 0251.254.169.254 (this got the $160,000 payout in Oct 2018)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    3. velj
    Poništi
  11. 3. velj

    manual hacking ftw. i knew today was going to be a good today ^_^ prob gonna find nothing for a few days now.. rip :(

    Poništi
  12. proslijedio/la je Tweet
    3. velj

    Guy creates fake traffic jams on Google maps by walking a handcart with 99 phones lmao

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    We are going public with our some of the products in our program . ~10 services will go from private -> public. This will be done gradually over the next two months. The program is now online at Happy hacking!

    Prikaži ovu nit
    Poništi
  14. 3. velj

    good morning world! feeling hyped AF this monday, ready to get straight into hacking, lets get dem bugz

    Poništi
  15. 2. velj

    joining Ben in 5 minutes:) come say hi!

    Poništi
  16. 2. velj

    Looking forward to chatting with tonight! :)

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    😱😱😱 is joining me on my stream this Sunday and we have a lot to talk about. I’m excited to see what makes zseano’s approach so unique and how he looks for bugs when he’s hacking!

    Poništi
  18. 29. sij

    😍 , what a pleasure meeting you all, awesome bunch of people!! Unexpectedly met aswell 🥳

    Poništi
  19. proslijedio/la je Tweet
    27. sij
    Poništi
  20. 26. sij

    This is a really good stream if you aren’t already watching check it out!

    Poništi
  21. 26. sij

    GET /example?param=test .. nothing interesting happened, not vuln to XSS. (<> " was filtered) but if I change it to POST it's reflected as value=\"test\" POST /example#xss param=test+onfocus='alert(0)'id='xss' ..and I can haz XSS bypassing their 'filter'

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·