Omar

49 posts

Omar

Omar

@0x0ld

Katılım Şubat 2022
104 Takip Edilen1.3K Takipçiler
Claude
Claude@claudeai·
Introducing Code Review, a new feature for Claude Code. When a PR opens, Claude dispatches a team of agents to hunt for bugs.
English
2.1K
5.2K
63K
23.3M
Omar
Omar@0x0ld·
@thedawgyg According to a member of the HackerOne staff, this is not currently being done, and they will provide more detailed information in the coming weeks.
Omar tweet media
English
0
0
3
984
dawgyg - WoH
dawgyg - WoH@thedawgyg·
"HackerOne Agentic PTaaS pairs specially trained AI agents"... specially trained on a decade worth of work from the largest pool of bug hunters on the planet.... without their consent... Maybe its time to find out how class action suits work and see if we have any ability to prevent them from using our work?
HackerOne@Hacker0x01

Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.

English
16
31
288
29.9K
Omar
Omar@0x0ld·
@fahadkhan__101 through trial and error while exploiting the SQL injection, the backend began returning “file not found” responses. I then injected /passwd into the second column, which resulted in the contents of that file being returned.
English
0
0
1
148
Fahad Khan
Fahad Khan@fahadkhan__101·
@0x0ld Can you tell me that how did you make that kind of payload?
English
1
0
4
1.1K
Omar
Omar@0x0ld·
Sexy
Omar tweet media
English
19
9
311
19.4K
Omar
Omar@0x0ld·
@trial_36545191 already escalated that and popped a shell on this host :p
English
0
0
0
95
Omar
Omar@0x0ld·
@userarceus @grok This issue originated as a SQL injection and was escalated to a local file disclosure due to improper sanitization of database values. These values were later passed to a file read function, allowing an attacker to manipulate the query results and alter the file’s source path.
English
0
0
1
79
Omar
Omar@0x0ld·
@wareeq_shile 3.As a result, the application reads the attacker-supplied path rather than the intended PDF location, leading to a Local File Disclosure vulnerability. here is an example of the code generated by chatGPT
Omar tweet media
English
1
0
1
167
Wareeq
Wareeq@wareeq_shile·
@0x0ld I’m confused by how this payload works reading system file from database column without any function ?!
English
3
0
1
1.3K
Omar
Omar@0x0ld·
@wareeq_shile 2.Due to insufficient input validation, the id parameter is vulnerable to a UNION-based SQL injection. By exploiting this flaw, an attacker can manipulate the query result and inject an arbitrary file path instead of the legitimate database value.
English
0
0
0
130
Omar
Omar@0x0ld·
@wareeq_shile 1.The affected endpoint accepts a hashed id parameter, which is used in a database query to retrieve the file path of a PDF document. Once a matching record is found, the application reads the file directly from the filesystem using a function such as file_get_contents().
English
0
0
6
954
Omar
Omar@0x0ld·
@marcaslevel1 @Hacker0x01 @marcaslevel1 Hi! Thanks a lot for the kind words. I’m completely self-taught, and the best resource I recommend is portswigger academy it’s free and very hands-on. bestof luck on your journey, and feel free to ask anytime!
English
1
0
1
75
Leonardo Torres
Leonardo Torres@marcaslevel1·
@0x0ld @Hacker0x01 Hi there! I’ve read your informative writeups. I’m new to cybersecurity and curious if you learned it yourself or attended formal schooling. If you did, I’d appreciate any helpful resources you found. Your knowledge is valuable, and I’m grateful for your sharing!!
English
1
0
0
107
Omar
Omar@0x0ld·
Just hit 10k! Let’s make it to the Top 100 on @Hacker0x01
Omar tweet media
English
9
1
192
8.9K
Omar
Omar@0x0ld·
@Zierax_x i've sent you a message, check your dm
English
0
0
1
137
0xZyo
0xZyo@Zierax_x·
@0x0ld Hi Omar, I just want to contact you regarding a question. How can I contact you?
English
1
0
0
184
Omar
Omar@0x0ld·
Just reached 5k! Hoping to hit 10k before the year wraps up!
Omar tweet media
English
2
0
46
5K
Omar
Omar@0x0ld·
@Masonhck3571 The developer was probably trying to handle both single and multiple values by splitting the input on ",". They likely added a check for when a single ID is passed, but forgot to handle the case where an array of IDs comes through.
English
0
0
5
977
malek
malek@MalekMohamed0·
@0x0ld @Hacker0x01 ما شاء الله موفق دايما يا عمر
العربية
1
0
1
352