Se abre el entrenamiento: Web Penetration Tester en Linea 🌐 los días 18,19,20 de Septiembre 2019 !
🚨 Más información en https://tpx.mx/cursos/web-penetration-tester/en-linea !
🚨 Más información en https://tpx.mx/cursos/web-penetration-tester/en-linea !
"Big announcement: after some months of continuing work, it is a pleasure to announce the Hunter Cat pre-sale. Hunter Cat is a portable skimmer detector for magnetic stripe readers."
https://twitter.com/Netxing/status/1153356128471801857
https://twitter.com/Netxing/status/1153356128471801857
Twitter
Salvador Mendoza
Big announcement: after some months of continuing work, it is a pleasure to announce the Hunter Cat pre-sale. Hunter Cat is a portable skimmer detector for magnetic stripe readers. More details: https://t.co/U3oyKpv8dW #payments #skimmer #huntercat #infosec…
Pwning child company to get access to ParentCompany's Slack Team
https://blog.parthmalhotra.com/pwning-child-company-to-get-access-to-parentcompanys-slack-team/
https://blog.parthmalhotra.com/pwning-child-company-to-get-access-to-parentcompanys-slack-team/
Parth Malhotra
Pwning child company to get access to ParentCompany's Slack Team
> Disclaimer : Prior permissions were taken before performing heavy attacks on the
targets below, you should not try this without taking prior permission.
The following was reported to a program on HackerOne, I have redacted the
company name, lets call it…
targets below, you should not try this without taking prior permission.
The following was reported to a program on HackerOne, I have redacted the
company name, lets call it…
How I found the most critical bug in live bug bounty event?
https://medium.com/@innocenthacker/how-i-found-the-most-critical-bug-in-live-bug-bounty-event-7a88b3aa97b3
https://medium.com/@innocenthacker/how-i-found-the-most-critical-bug-in-live-bug-bounty-event-7a88b3aa97b3
Medium
How I found the most critical bug in live bug bounty event?
Hey Folks! Hope you guys are doing great.
XSS to RCE “yeah right, RSnake”
https://medium.com/@hungrybytes/xss-to-rce-in-e20b2bc55f94
https://medium.com/@hungrybytes/xss-to-rce-in-e20b2bc55f94
En este momento se lleva la sentencia de MalwareTech puedes seguirla en tiempo real en el Twitter de EmptyWheel
Los mejores deseos a Marcus
https://twitter.com/emptywheel/status/1154789624843329536
Los mejores deseos a Marcus
https://twitter.com/emptywheel/status/1154789624843329536
Twitter
emptywheel
In Milwaukee for @MalwareTechBlog sentencing hearing, that begins in 7 minutes. Most of the sentencing materials are sealed, but here's the govt filing. https://t.co/LZdpqGMpbD
Android Pentesting/Bug Hunting 101
-set-up Burp
-bruteforce OTP
-ADB leaks
-IDOR vulnerability
-list of static & dynamic vulnerabilities you should always check
https://link.medium.com/Ohrs3M1eFY
-set-up Burp
-bruteforce OTP
-ADB leaks
-IDOR vulnerability
-list of static & dynamic vulnerabilities you should always check
https://link.medium.com/Ohrs3M1eFY
Medium
Android Pen-testing/Hunting 101
Currently I’m Pen-testing on private projects so if you have any project to test kindly reach me on Twitter @hst_kishan
AWS-IAM-Privilege-Escalation
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
GitHub
GitHub - RhinoSecurityLabs/AWS-IAM-Privilege-Escalation: A centralized source of all AWS IAM privilege escalation methods released…
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs. - RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
Single User DOS by Poisoning Cookie via Get Parameter
https://hackerone.com/reports/416966
https://hackerone.com/reports/416966
HackerOne
Pornhub disclosed on HackerOne: Single User DOS by Poisoning Cookie...
The researcher was able to exploit a cookie poisoning attack against other users, by sending malicious links to the victims, as a result, the victims were no longer be able to access...
Bypassing Cloudflare WAF with the origin server IP address
https://blog.detectify.com/2019/07/31/bypassing-cloudflare-waf-with-the-origin-server-ip-address/
https://blog.detectify.com/2019/07/31/bypassing-cloudflare-waf-with-the-origin-server-ip-address/
Blog Detectify
Bypassing Cloudflare WAF with the origin server IP address
Crowdsource hacker Gwendal shares tutorial on how he bypassed Cloudflare WAF, commonly used by companies, with the origin server IP.