rootaccess

6.3K posts

rootaccess banner
rootaccess

rootaccess

@rootpentesting

Red Team | | OSCP | Loves to make the World more #secure by hacking the #planet | Addicted to rooting boxes @hackthebox_eu

Chernobyl Reactor no3 शामिल हुए Ağustos 2015
918 फ़ॉलोइंग7.9K फ़ॉलोवर्स
पिन किया गया ट्वीट
rootaccess
rootaccess@rootpentesting·
Security is just an illusion against time #hacktheplanet
English
3
15
87
0
rootaccess
rootaccess@rootpentesting·
@DuneAwakening why is EU lagging so hard right now dione - sietch eaqrab
English
0
0
1
234
Dune: Awakening
Dune: Awakening@DuneAwakening·
Sleepers, we have news! Patch 1.1.10.0 is now live on the new Public Test Client. Be among the first to experience the changes, and help us hunt down technical issues. 🔽 Read more about the Public Test Client and get the patch notes here: duneawakening.com/news/announcin…
Dune: Awakening tweet media
English
152
56
647
59.7K
rootaccess
rootaccess@rootpentesting·
@HackenProof no its not to late, since technology keeps changing however starting early is always better.
English
0
0
4
447
HackenProof
HackenProof@HackenProof·
Is it too late to start learning bug hunting after 30?
English
40
7
183
22.4K
rootaccess
rootaccess@rootpentesting·
So its 2024, by now i thought company's have learned to treat security researchers with respect dear @OnceHuman_ i tryed to submit a security vulnerability, through proper channels, however you chose to ignore me, now im going for public disclosure. #XSS #OnceHuman
rootaccess tweet media
English
1
0
2
539
rootaccess
rootaccess@rootpentesting·
@Blaklis_ @hunt_n27493 @golu_369 @TMobile alot of exploits in BEEF are patched on upto date browsers. but yea ofcourse if OR is out of scope its out of scope, he didnt understand that i think.
English
1
0
0
112
Blaklis
Blaklis@Blaklis_·
@rootpentesting @hunt_n27493 @golu_369 @TMobile BEEF works on up to date browsers, afaik - but that's not even the issue - that will be just javascript executed on your own website. Nothing related to the target. If OR is out of scope, it is out of scope, not much to add
English
1
0
0
157
rootaccess
rootaccess@rootpentesting·
@hunt_n27493 @golu_369 @TMobile i think beef only works on outdated browsers, also if the open redirect was already a dupe, beef wont change anything no
English
2
0
0
131
Paradox hunt (N.u)
Paradox hunt (N.u)@hunt_n27493·
@golu_369 @TMobile agree bro i also got a open redirect on a company and what happen i chain it to next level using beef i can exploit user but still they say dup + oos and saying beef wont change anything and when i say sir user safety is bigger then your rules they havent speak anything its 😌
English
2
0
0
3.8K
Lorenz Lehmann
Lorenz Lehmann@LehmannLorenz·
10/ To get more info, I also ran it though @HybridAnalysis. Apparently the script even detects VMs to hide from being reverse engineered! Advanced stuff we are dealing with here.
Lorenz Lehmann tweet media
English
4
9
439
66.6K
Lorenz Lehmann
Lorenz Lehmann@LehmannLorenz·
Today, my PC was nearly compromised. With just one click, I installed a malicious @code extension. Luckily, I was saved as my PC doesn't run on Windows. Hackers are getting smarter and aren't just targeting beginners. Here's how they do it and how you can protect your coins!
Lorenz Lehmann tweet mediaLorenz Lehmann tweet mediaLorenz Lehmann tweet media
English
203
1.7K
10.3K
2.5M
rootaccess
rootaccess@rootpentesting·
@golu_369 what was the exploit further then ? add a payload and wait for another mail or ?
English
1
0
0
261
golu_369
golu_369@golu_369·
Testing for SSTI ,Used {{7*7}} in username field . The main website was not vulnerable and the payload {{7*7}} didn’t executed . After few months got a promotional email from that target and found out the payload was executing there✌🏻.check your mails. #bugbounty #bugbountytips
English
4
4
105
7.8K