spidersec

329 posts

spidersec banner
spidersec

spidersec

@SpiderSec

- Suvadip Kar

Down to Earth Beigetreten Aralık 2016
90 Folgt5.6K Follower
Angehefteter Tweet
spidersec
spidersec@SpiderSec·
HTTP Request Smuggling in one Screenshot. 🙂
spidersec tweet media
English
15
671
1.5K
0
spidersec
spidersec@SpiderSec·
If you’re around for Black Hat Asia Singapore ( April 1-4 ), let’s catch up!
English
0
0
2
591
spidersec retweetet
Johnny Xmas
Johnny Xmas@J0hnnyXm4s·
hashcat -w 4
Johnny Xmas tweet media
English
47
105
911
0
spidersec retweetet
Thanh Nguyen
Thanh Nguyen@redragonvn·
Our Pre-Auth RCE exploit for Atlassian Confluence (CVE-2021–26084) was leaked after reporting it to @VMware. They have refused to admit the leak and ignored our emails. tradahacking.vn/atlassian-conf…
English
25
390
959
0
spidersec
spidersec@SpiderSec·
Hard work, new car 🙂🧘
spidersec tweet media
English
11
0
164
0
SATISH S
SATISH S@satish28888·
I am trying out Nuclei for some testing . Eventually would love to integrate it to my every day work. Does anyone have any references for templates for web applications testing. @SpiderSec
English
2
0
10
0
spidersec
spidersec@SpiderSec·
@DenFox93 No, 200 is the server response status
English
0
0
0
0
Fox
Fox@DenFox93·
@SpiderSec i need to add also "-> 200" to the headers?
English
1
0
0
0
spidersec
spidersec@SpiderSec·
Rate Limiting Bypass : (429 Too many Requests) Append the headers to a request where the server is responding with 429 Client-Ip: IP -> 200 X-Client-Ip: IP -> 200 X-Forwarded-For: IP -> 200 X-Forwarded-For: 127.0.0.1, IP -> 200 IP = Random IP Address that you want to spoof 🙂
English
8
106
330
0
spidersec
spidersec@SpiderSec·
@hummus_ful Yes you are correct, its not a valid test case for layer 4
English
0
0
0
0
Hummus_Ful ❤️
Hummus_Ful ❤️@hummus_ful·
@SpiderSec I guess that's true for only application layer (L7) rate limits, not network (L4) layer, or am I missing something
English
1
0
0
0
spidersec
spidersec@SpiderSec·
If ip based rate Limiting is implemented, you can block a legitimate user from accessing the website Client-Ip: Victim-Ip-Address -> 500 request -> Blocked
English
0
0
8
0
spidersec
spidersec@SpiderSec·
This is mostly effective on : "Ip Based Rate Limiting"
English
1
0
6
0