Information Security
@sec_nerd_en
416
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
416 subscribers
Information Security
https://github.com/danielmiessler/SecLists/blob/master/Fuzzing/JSON.Fuzzing.txt
GitHub
SecLists/Fuzzing/JSON.Fuzzing.txt at master · danielmiessler/SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, pas...
Information Security
https://jlajara.gitlab.io/posts/2020/03/29/Path_Traversal.html
Information Security
https://medium.com/@ch3ckm4te/self-xss-to-account-takeover-72c89775cf8f
Medium
Self XSS to Account Takeover
Exploiting Self Stored XSS to escalate and achieve Account Takeover using Logout CSRF & oAuth functionality to Steal Cookies or Change…
Information Security
https://www.hackingarticles.in/credential-dumping-wireless/
Hacking Articles
Credential Dumping: Wireless
Learn how attackers dump credentials from wireless networks and devices, and how to prevent such attacks in your wireless environment.
Information Security
https://www.secjuice.com/hiding-javascript-in-png-csp-bypass/
Information Security
https://medium.com/swlh/diving-into-unserialize-more-than-rce-d48d371db7da
Medium
Diving into unserialize(): More than RCE
Achieving authentication bypass and SQL injection using PHP’s unserialize()
Information Security
https://snyk.io/blog/prototype-pollution-minimist/
Snyk
Prototype pollution vulnerability in minimist npm package | Snyk
This post discusses the prototype pollution vulnerability, explains how certain applications can be subject to it, and describes the rationale behind its severity classification.
Information Security
https://medium.com/rungo/how-to-write-a-simple-go-program-13fd104f3018
Medium
How to write a simple Go Program
In this tutorial, we are going to look at the basic structure of a Go program and run a simple Hello World program.
Information Security
https://raelize.com/posts/d-link-dsl-2640b-security-advisories/
Information Security
https://www.hahwul.com/2018/08/attack-json-csrf-with-swfactionscript.html
Information Security
https://labs.f-secure.com/blog/pth-attacks-against-ntlm-authenticated-web-applications/
Information Security
#coronavirus
Information Security
https://natedotred.wordpress.com/2020/03/28/cve-2020-8816-pi-hole-remote-code-execution/
Nate's Blog
CVE-2020-8816 – Pi-hole Remote Code Execution
Impact Pi-hole is affected by a Remote Code Execution vulnerability. An authenticated user of the Web portal can execute arbitrary command with the underlying server with the privileges of the loca…
Information Security
https://xss.pwnfunction.com/challenges/me-and-the-bois/
PwnFunction
XSS Game - Me and the Bois | PwnFunction
XSS Game: Learn Cross Site Scripting (XSS) by completing challenges!
Information Security
https://www.synacktiv.com/posts/pentest/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html
Information Security
https://www.hahwul.com/2020/03/recon-using-fzf-and-other-tools-for-bugbounty.html
Information Security
https://about.gitlab.com/blog/2020/03/30/how-to-exploit-parser-differentials/
about.gitlab.com
How to exploit parser differentials
Your guide to abusing 'language barriers' between web components.
Information Security
https://research.nccgroup.com/2020/03/30/impact-of-dns-over-https-doh-on-dns-rebinding-attacks/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Information Security
https://www.activecyber.us/activelabs/docker-desktop-local-privilege-escalation-cve-2020-10665
Active Cyber
Docker Desktop Local Privilege Escalation (CVE-2020-10665)
Docker is a tool designed to make it easier to create, deploy, and run applications by using containers. Containers allow a developer to package an application with all of the parts it needs, such...
Information Security
https://twitter.com/ameenmaali/status/1244886922796740608
Twitter
Ameen
Messed around a bit more since I needed to load in a script for CSP bypass as well and somehow this bypasses Akamai <SCr%00Ipt>confirm`1`</scR%00ipt> (can load scripts with src as well)
🤔
#bugbountytips #bugbountytip