๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ

1.2K posts

๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ banner
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ

๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ

@0dayWizard

Cybersec researcher & exploit developer w/ emphasis on webapp security. Former #TeaMp0isoN + former Founder of Project Insecurity LTD + founder of Bug0xF4.

keybase.io/0dayWizard ๊ฐ€์ž…์ผ Temmuz 2021
186 ํŒ”๋กœ์ž‰4.6K ํŒ”๋กœ์›Œ
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
Been writing a script to make post-exploitation on *nix easier for beginners, here's what I've added so far. If anyone can think of more functionality to add then please let me know. I've made a primitive UI to make it easier for beginners to use (rather than cmdline args)
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ tweet media
English
1
1
7
1.2K
godiego
godiego@_godiego__ยท
@0dayWizard @serverinspector Open redirect shouldnโ€™t work as CSP will still block the redirected site (unless Iโ€™m missing something) ๐Ÿค”
English
1
0
0
258
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
I asked this like a year ago but didn't get a response.. everything else for my chain is still working so I'll ask again.. Does anyone currently have JSNOP callback or open redirection in *.paypalobjects.net? I'll split the bounty with you if you've got one.
English
1
0
2
983
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@coffinxp7 Yeah I did see that the payload list covered some different contexts, but it would be cool to see a post breaking down each of those contexts and explaining the situations in which different context-specific payloads should be used. Either way, nice post.
English
1
0
1
237
Coffin
Coffin@lostsec_ยท
great point! thatโ€™s actually why I included a payload list in the article. it covers multiple contexts. you can use it with burp intruder to automate testing since manually checking each one is time consuming plus without knowing the backend query structure trial and error is often necessary. sometimes even a single backslash (\) can break the query and reveal valuable clues.
English
1
0
0
274
Coffin
Coffin@lostsec_ยท
This single article is enough to master SQL Injection for beginners. I've included all the methodologies I personally use to find SQLi vulnerabilities. I'll also be updating it soon with some SQLMap tamper bypass scripts and manual bypass techniques as soon as I get some free time infosecwriteups.com/mastering-sql-โ€ฆ
English
10
92
461
34.7K
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
Why is this even news? Someone reported a vuln to the VDP of probably the least secure .gov site in existence and somehow this is newsworthy? Does anyone even know what type of attack vector it was? Is there a writeup? I fail to see what makes this "breaking news"
News Arena India@NewsArenaIndia

BREAKING NEWS ๐Ÿšจ ๐Ÿ“ข 14 year old Yuvraj Gupta, who lives in Kanpur, Uttar Pradesh, has done a great feat. Hesaved the website of American space agency NASA from hackers. NASA has included him in the 'Hall of Fame' and also given him a letter of recognition.

English
6
1
6
1.8K
Daniel Kelley
Daniel Kelley@danielmakelleyยท
Reminder: There are talented people in cybersecurity who don't use social media.
English
3
1
22
2.1K
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@vxdb I get that this is the results of an investigation from 2023, but by now it's pretty much old news given that all of these markets are dead and the customers getting arrested are most likely dealers themselves. I can't see how this would disrupt any currently existing DNM's.
English
0
0
0
81
vxdb
vxdb@vxdbยท
US & Europol seized $200M, 144kg of fentanyl-laced drugs, and 180+ guns. Targets included dark web vendors, admins, and buyers from sites like Tor2Door, Bohemia, Kingdom Market, Nemesis and Incognito. This is a major blow to the darknet market scene.
vxdb tweet media
English
7
18
76
7.5K
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@coffinxp7 I see tons of people starting their payload with ' or %27 and just assuming it isn't vuln when that doesn't work, but I never see articles covering how payloads need to be tweaked for different context and in situations where starting with ' doesn't work, something like ") might
English
1
0
1
260
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@coffinxp7 Nice article, however one thing I NEVER see in articles regarding SQLi is context-specific payloads, i.e. how you need to change the start of your payload based upon where in the SQL statement your inputs are being reflected into.
English
1
0
1
674
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@DexerTDP Lol I think I freaked them out cos I shared something in gov.ph so they kicked me from their private Keybase server thinking I was trying to bait them into getting v& and extradited to the Philippines I guess ๐Ÿ™ƒ I met some chill people in there though.
English
0
0
0
51
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@xitsec So it was literally just a case of reading that file from the extracted tarball and then connecting to their MySQLd using those creds. Second time I hacked them was using a CVE that had been public for several years. Even to this date they're vuln to tons of dumb BS like that..
English
0
0
0
173
๐Ÿ•ต๏ธ MLT ๐Ÿง™โ€โ™‚๏ธ
@xitsec The first time I hacked NASA I found a wordpress installation there with open directory listings and a "backup.tar.gz" file -- the tarball was a backup of their WP site with wp-config.php included in there. Working plaintext MySQL creds in that file + open port 3306
English
1
0
0
166
xit! ๐Ÿ‡ฎ๐Ÿ‡ณ
xit! ๐Ÿ‡ฎ๐Ÿ‡ณ@xitsecยท
Oh just saw the nasa hack post ๐Ÿ˜‚ lol He is saying he got Youngest ethical hacker awards wtf ? How
English
8
0
33
6.4K