Information Security
@sec_nerd_en
417
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
417 subscribers
Information Security
https://hackerone.com/reports/713
HackerOne
HackerOne disclosed on HackerOne: Upload profile photo from URL
Using this vulnerability users can upload images from any image URL.
Just change upload type using inspect element (from "type=file" to "type=url") , paste URL in text field and hit enter or...
Information Security
https://medium.com/@neerajedwards/reading-internal-files-using-ssrf-vulnerability-703c5706eefb
Medium
Reading Internal Files using SSRF vulnerability
I am hunting on one private program since last 8 months, since it doesn’t allow disclosure i will keep organization REDACT, in requests i…
Information Security
https://medium.com/bugbountywriteup/how-i-was-able-to-remove-your-instagram-phone-number-d346515e79c3
Medium
How I was able to remove your Instagram Phone number
Phone numbers are the most important Out-of-band features in network and security, now a days from phone number we register, login for an…
Information Security
https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572
Medium
How I was able to bypass OTP code requirement in Razer [The story of a critical bug]
A story of turning an Informative bug to critical bug
Information Security
https://www.perched.io/blog/2019/1/3/dns-tunneling-amp-other-hunts-w-rocknsm-bro-amp-elk
Information Security
https://www.slideshare.net/mobile/Insovince/external-service-interaction
www.slideshare.net
External service interaction
External Service Interaction arises when it is possible to induce an application to interact with an arbitrary external service, such as a web or mail server e…
Information Security
https://portswigger.net/kb/issues/00300200_external-service-interaction-dns
portswigger.net
External service interaction (DNS)
The ability to induce an application to interact with an arbitrary external service, such as a web or mail server, does not constitute a vulnerability in its own right. This might even be the intended behavior of the application. However, in some cases, it…
Information Security
https://medium.com/@chawdamrunal/how-i-exploit-out-of-band-resource-load-http-using-burp-suite-extension-plugin-taborator-2c5065d6a50b
Medium
How i exploit out-of-band resource load (HTTP) using burp suite extension plugin (taborator)
Issue background
Information Security
Jailbreak2019.WhatsUpWithWhatsApp.pdf
2.9 MB
https://vimeo.com/377181218
Information Security
https://pentestmag.com/exploiting-the-entity-xme-xml-external-entity-injection/
Pentestmag
Exploiting The Entity: XXE (XML External Entity Injection) - Pentestmag
History In the recent year, major tech giants, like Google, Facebook, Magento, Shopify, Uber, Twitter, and Microsoft, have undergone XML …
Information Security
https://hackerone.com/reports/506646
HackerOne
Starbucks disclosed on HackerOne: Webshell via File Upload on...
johnstone discovered An arbitrary file upload via the resume functionality at https://ecjobs.starbucks.com.cn which led to arbitrary code execution by uploading a webshell.
@johnstone — thank for...
Information Security
https://medium.com/@johnssimon_6607/getting-access-to-disabled-hidden-features-with-the-help-of-burp-match-and-replace-e1d7b70d131e
Medium
Getting access to disabled/hidden features with the help of Burpsuite Match and Replace settings
A few months ago, During my bug bounty hunting, I came across a Company that lets other developers create API documentation similar to…
Information Security
https://github.com/jreppiks/CVE-2017-12149
GitHub
GitHub - jreppiks/CVE-2017-12149: Jboss Java Deserialization RCE (CVE-2017-12149)
Jboss Java Deserialization RCE (CVE-2017-12149). Contribute to jreppiks/CVE-2017-12149 development by creating an account on GitHub.
Information Security
https://www.a12d404.net/windows/2019/01/13/persistance-via-path-directories.html
www.a12d404.net
Windows 10 Persistence via PATH directories - CDPSvc
CDPSvc allows DLL Loading via writable PATH directories
Information Security
https://www.apriorit.com/dev-blog/640-qa-fuzzing-for-closed-source-windows-software
Apriorit
Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing | Apriorit
This article is about discovering vulnerabilities even in closed source software by applying fuzzing testing.
Information Security
https://decoder.cloud/2019/12/12/from-iphone-to-nt-authoritysystem/
Decoder's Blog
From iPhone to NT AUTHORITY\SYSTEM
As promised in my previous post , I will show you how to exploit the “Printconfig” dll with a real world example. But what does Apple’s iPhone have to do with it?? Well, keep on r…
Information Security
https://microsoft.github.io/CCF/
https://github.com/microsoft/CCF
GitHub
GitHub - microsoft/CCF: Confidential Consortium Framework
Confidential Consortium Framework. Contribute to microsoft/CCF development by creating an account on GitHub.
Information Security
https://github.com/hubert3/isniff-gps
GitHub
hubert3/iSniff-GPS
Passive sniffing tool for capturing and visualising WiFi location data disclosed by iOS devices - hubert3/iSniff-GPS
Information Security
https://medium.com/tenable-techblog/winbox-in-the-wild-9a2ee4946add
Medium
Winbox in the Wild
Port 8291 Scan Results
Information Security
https://medium.com/@dirtycoder0124/blind-xss-a-mind-game-to-win-the-battle-4fc67c524678
Medium
Blind Xss (A mind game to win the battle)
In this write-up, I will explain how I exploited a blind XSS in the backend portal of a program.