Information Security
@sec_nerd_en
415
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
415 subscribers
Information Security
https://awesomeaakash.github.io/2019/10/29/Bug-Bounty-Writeups-Summary-2/
awesomeaakash.github.io
Bug-Bounty-Writeups-Summary-2
Hello friends, Here is Part 2 of Bug Hunting Writeup Summary ->
Information Security
https://www.youtube.com/watch?v=kcnJMKXnW1k
YouTube
PayPal Inc Bug Bounty - Arbitriary File Upload Vulnerability & Remote Code Execution Vulnerability
Title: PayPal Inc Bug Bounty - Arbitriary File Upload Vulnerability & Remote Code Execution
URL: https://www.vulnerability-lab.com/get_content.php?id=2180
Information Security
https://medium.com/@danangtriatmaja/bug-bounty-self-xss-clickjacking-good-xss-tokopedia-8df7a65e0955
Medium
[ BUG BOUNTY ] Self XSS + ClickJacking = Good XSS | Tokopedia
Hi sobat, bagaimana kabarnya ? semoga senantiasa sehat selalu dan diberikan kelancaran dalam aktifitasnya. ^-^
Information Security
https://twitter.com/CurtBraz/status/1180372698167435265
Twitter
𝐂𝐮𝐫𝐭𝐢𝐬 𝐁𝐫𝐚𝐳𝐳𝐞𝐥𝐥
Found HTML Injection in a web form but the CSP was blocking execution. I noticed *.google.com was allowed which is common for Google Analytics. Hosted an xss.js payload on Google Drive and found the raw download link. Passed that in to the script src location…
Information Security
https://github.com/devploit/XORpass
GitHub
GitHub - devploit/XORpass: Encoder to bypass WAF filters using XOR operations.
Encoder to bypass WAF filters using XOR operations. - devploit/XORpass
Information Security
https://www.a12d404.net/windows/2019/10/30/schedsvc-persist-without-task.html
www.a12d404.net
Persistence using Task Scheduler without a Scheduled Task
Task Scheduler service loads a non-existing DLL enabling persistence as `NT AUTHORITY\SYSTEM`.
Information Security
https://twitter.com/brutelogic/status/1189555088282587138
Twitter
Brute Logic
POI - #PHP Object Injection Leading zeroes & Arbitrary Chars Example: O:008:"stdClass":0001**s:006:"bypass";b:1;} (almost anything can be used in ** ) #bypass #bugbountytip
Information Security
https://medium.com/@mastomi/xss-to-account-takeover-d5beddc5c704
Medium
XSS to Account Takeover
Bypassing CSRF Header Protection and HTTPOnly Cookie
Information Security
https://medium.com/@rrubymann/how-to-easily-find-reflected-xss-vulnerabilities-6377ab6f3e1f
Medium
How to easily find Reflected XSS vulnerabilities!
Hello everybody!
Information Security
https://github.com/zigoo0/JSONBee
GitHub
GitHub - zigoo0/JSONBee: A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.
A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites. - zigoo0/JSONBee
Information Security
https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/
Palo Alto Networks Blog
Analysis of Two Newly Patched Kubernetes Vulnerabilities
We highly recommend upgrading to Kubernetes builds 1.14.8, 1.15.5 or 1.16.2 to address two recently patched Kubernetes vulnerabilities.
Information Security
https://wwws.nightwatchcybersecurity.com/2019/10/24/nfc-beaming-bypasses-security-controls-in-android-cve-2019-2114/
Nightwatch Cybersecurity
NFC Beaming Bypasses Security Controls in Android [CVE-2019-2114]
Summary NFC beaming of applications between devices using Android OS bypasses some security controls (the “install unknown application” prompt). A rogue device like a payment terminal c…
Information Security
http://www.fuzzysecurity.com/tutorials/19.html
Information Security
https://twitter.com/issuemakerslab/status/1189657874491822080
Twitter
Simon Choi
This is North Korea's malware used in the attack on India's nuclear power plant. They had infiltrated the South Korean military's internal network in 2016 and stole classified information. And they once destroyed South Korean broadcasting stations and banking…
Information Security
https://omespino.com/write-up-private-bug-bounty-usd-rce-as-root-on-marathon-instance/
Information Security
https://blog.knownsec.com/2019/10/weblogic-ejbtaglibdescriptor-xxe%e6%bc%8f%e6%b4%9ecve-2019-2888%e5%88%86%e6%9e%90/
WebLogic XXE in EJBTaglibDescriptor (CVE-2019-2888)
(translate)
Information Security
https://medium.com/@z3roTrust/bypassing-windows-user-account-control-9051c6a85734
Medium
Bypassing Windows User Account Control
Look at you go with your badass hacker self, just hackity-hack-hackin’ away. As the quote from Sun Tzu’s Art of War suggests, however, if you can defeat your opponent without a fight or little-to-no…
Information Security
https://medium.com/bugbountywriteup/5-000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop-1e99375f0968
Medium
5,000 USD XSS Issue at Avast Desktop AntiVirus for Windows (Yes, Desktop!)
CVE-2019–18653 & CVE-2019–18654: The story when Reflected XSS was triggering from SSID Name (It also affected AVG AntiVirus since basically
Information Security
https://github.com/nyxgeek/ntlmscan
GitHub
GitHub - nyxgeek/ntlmscan: scan for NTLM directories
scan for NTLM directories. Contribute to nyxgeek/ntlmscan development by creating an account on GitHub.
Information Security
https://twitter.com/HackingDave/status/1189944817482108929
Twitter
Dave Kennedy (ReL1K)
Getting snagged by AV using regsvr32 /i:http(s)? Signatures are based on utilizing http within command. Don't use http or chain multiple commands together for same effect. https://t.co/ZbnYL00may