teflon

108 posts

teflon

teflon

@0xTeflon

CEO of Charlie Defense - https://t.co/fUNTe6pzwR Bugcrowd/Hackerone - teflon

Virginia, USA Katılım Kasım 2024
136 Takip Edilen858 Takipçiler
teflon
teflon@0xTeflon·
@oegerikus @Xbow Cool post i watched the video and this exactly the type of work i do with AI as a bug hunter
English
0
0
1
54
teflon
teflon@0xTeflon·
@rez0__ @vokaysh Great in some ways, however, websocket support sucks
English
0
0
0
99
Joseph Thacker
Joseph Thacker@rez0__·
annndddd another friend: > Took your advice, built a hacking companion in Caido. Found and submitted a bug within an hour.
English
12
2
73
10.6K
teflon
teflon@0xTeflon·
@zseano @rez0__ I didnt even think of feeding it my h1 reports im so dumb lol. Ill try that today
English
0
0
0
232
zseano
zseano@zseano·
@rez0__ I need to try this.. 👀
English
2
0
2
3.9K
Joseph Thacker
Joseph Thacker@rez0__·
a good friend of mine said to me this morning:
Joseph Thacker tweet media
English
10
2
139
63.2K
teflon
teflon@0xTeflon·
@rez0__ Yeah its crazy claude found me 3 rces in the last 4 days
English
1
0
9
1.7K
Joseph Thacker
Joseph Thacker@rez0__·
It is hard to communicate how much bug bounty has changed due to AI in the last 2 months: not gradually and over time in the "progress as usual" way, but specifically this last December. There are a number of asterisks but imo coding agents basically didn't work for security research before December and basically work since - the models have significantly higher quality, long-term coherence and tenacity and they can power through large and long hacking tasks, well past enough that it is extremely disruptive to the default bug bounty workflow. Just to give an example, over the weekend I pointed Claude Code at a new program's scope and wrote: "Here are the target domains. Enumerate subdomains, grab all the JavaScript bundles, run the full analysis pipeline (endpoints, secrets, source-sink tracing, postMessage handlers), fuzz the discovered paths, spider the authenticated surface, check for IDORs on user APIs, test any interesting GraphQL endpoints, and write up an HTML report of everything you find." The agent went off for ~30 minutes, ran into multiple issues (auth failures, WAF blocks, malformed responses), researched solutions, resolved them one by one, analyzed the JS, fuzzed endpoints, tested access controls, and came back with the report. Two confirmed vulnerabilities and a handful of interesting leads. I didn't touch anything. All of this could easily have been a full weekend of manual work just 3 months ago but today it's something you kick off and forget about for 30 minutes. As a result, bug bounty hunting is becoming unrecognizable. You're not manually clicking through Burp Suite and hand-testing parameters one by one like the way things were since this industry started, that era is over. You're spinning up AI agents, giving them targets *in English* and managing and reviewing their output in parallel. The biggest prize is in figuring out how you can keep ascending the layers of abstraction to set up long-running orchestrator agents with all the right skills, memory and instructions that productively manage multiple parallel hacking instances for you. The leverage achievable via top tier "agentic engineering" for security research feels very high right now. My friends and I have been building out custom skill libraries for Claude Code - things like JS static analysis pipelines, authenticated fuzzing, IDOR testing frameworks, GraphQL introspection - and sharing them with each other. Each person's agent gets better as the collective skill set grows. We're finding more bugs in a week than we used to find in a month. It's not perfect, it needs high-level direction, judgement, hacker intuition, oversight, iteration and hints and ideas. It works a lot better in some scenarios than others (e.g. especially for targets with thick JavaScript clients where you can verify findings with a curl command). The key is to build intuition to decompose the target just right to hand off the recon and testing parts that work and help out around the edges with the creative exploitation. But imo, this is nowhere near "business as usual" time in bug bounty.
Andrej Karpathy@karpathy

It is hard to communicate how much programming has changed due to AI in the last 2 months: not gradually and over time in the "progress as usual" way, but specifically this last December. There are a number of asterisks but imo coding agents basically didn’t work before December and basically work since - the models have significantly higher quality, long-term coherence and tenacity and they can power through large and long tasks, well past enough that it is extremely disruptive to the default programming workflow. Just to give an example, over the weekend I was building a local video analysis dashboard for the cameras of my home so I wrote: “Here is the local IP and username/password of my DGX Spark. Log in, set up ssh keys, set up vLLM, download and bench Qwen3-VL, set up a server endpoint to inference videos, a basic web ui dashboard, test everything, set it up with systemd, record memory notes for yourself and write up a markdown report for me”. The agent went off for ~30 minutes, ran into multiple issues, researched solutions online, resolved them one by one, wrote the code, tested it, debugged it, set up the services, and came back with the report and it was just done. I didn’t touch anything. All of this could easily have been a weekend project just 3 months ago but today it’s something you kick off and forget about for 30 minutes. As a result, programming is becoming unrecognizable. You’re not typing computer code into an editor like the way things were since computers were invented, that era is over. You're spinning up AI agents, giving them tasks *in English* and managing and reviewing their work in parallel. The biggest prize is in figuring out how you can keep ascending the layers of abstraction to set up long-running orchestrator Claws with all of the right tools, memory and instructions that productively manage multiple parallel Code instances for you. The leverage achievable via top tier "agentic engineering" feels very high right now. It’s not perfect, it needs high-level direction, judgement, taste, oversight, iteration and hints and ideas. It works a lot better in some scenarios than others (e.g. especially for tasks that are well-specified and where you can verify/test functionality). The key is to build intuition to decompose the task just right to hand off the parts that work and help out around the edges. But imo, this is nowhere near "business as usual" time in software.

English
27
56
564
84.2K
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
❌ RTFM ✅ Use AI instead
English
7
2
121
13.4K
teflon retweetledi
ChaoticV
ChaoticV@_ChaoticV·
Been working on a new tool for bug bounty hunters and will be looking for some testers in the near future, message me if you are interested! chaoticrecon.com
English
0
3
10
1.2K
teflon
teflon@0xTeflon·
@S1renHead_ Yes its definitely new changes bc we've never had the issue until today when his messages started being flagged as potential spam
English
0
0
0
54
teflon
teflon@0xTeflon·
@thedawgyg curious, what LLM model do you use? I've been experimenting with opus 4.6 for 0day hunting in chrome libraries with AFL today and have had some luck, one high i validated and will submit soon
English
0
0
5
818
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Started up some agents to work tonight. Have 1 agent that is looking for nothing but stored xss, 1 on SSRF, 1 on sqli, and will see whch can have the most valid success by morning. ive got them 'competing' in a competition with each other to see who's better.. lol
English
4
0
93
6.7K
teflon
teflon@0xTeflon·
@vitobotta @IamKyros69 Curious whats wrong with ur extension? It works for me for the most part wxcept when creation new passwords in fields instead of copying them manually
English
1
0
1
17
Vito Botta
Vito Botta@vitobotta·
@IamKyros69 My favourite is Vivaldi. The only reason why I have been using Brave is because the Bitwarden extension doesn't work perfectly in Vivaldi. For the past couple of days I have been testing Opera and I actually like it.
English
1
0
0
81
Kyros
Kyros@IamKyros69·
Can you name a single browser better than Brave?
Kyros tweet media
English
57
1
52
3.5K
teflon
teflon@0xTeflon·
@thedawgyg I also have some contacts. Shoot me a DM :)
English
0
0
2
148
dawgyg - WoH
dawgyg - WoH@thedawgyg·
Do I know anyone that knows how to exploit things on Windows? While trying to go to bed last night, was thinking about the vuln and figured there's alot more things that are likely vuln to it.
English
7
2
21
3.5K
the_IDORminator
the_IDORminator@the_IDORminator·
Race Condition IDOR, $36,750 Where automation fails is often in the gray areas. In the case of this bug, an IDOR existed by integer "orderId", which would allow viewing and hijacking someone else's order by simple swapping the order number - but ONLY IF the order had not yet completed. We see here that the order is 10099780. If we increment up by 1 to 10099781, it may have said "not found" (404) or access denied (403), and we keep incrementing upwards to maybe 10099788 (eight orders higher), and suddenly we get data back (200). You tinker around a bit more, come back to that same number, and now it says access denied (403). Hrmm. So you increment up again, and get another hit, which again turns to access denied in a matter of seconds or minutes. After some pondering, you realize it turns out that once an order is completed, the access control kicks in, but not while the order is still in progress. Well ain't that fun. From an attackers perspective, what can we do with this? What is the risk? Imagine you could change the shipping address on someones uncompleted order and intercept the product they are about to pay for. Or increasing the quantity of the product they are purchasing. Suddenly you have a warehouse full of goods you didn't pay for. That's not good for the company! Perhaps automated tooling was used to scan this, but if no other orders were in progress in lower environments, maybe it got missed. Sometimes things just don't get found until they are in production for so many reasons. If you are gonna do some #hacking, may as well do it on #bugbounty programs and get paid for it instead of wasting time on HTB and random labs. "Hey random guy, how did you get so good at hammering?" Random Guy: "I used the hammer every day for 5 years."
the_IDORminator tweet media
English
11
89
831
31.3K
teflon
teflon@0xTeflon·
@Microsoft plz fix your apps i need my work email
teflon tweet media
English
0
0
3
269
Medusa
Medusa@medusa_0xf·
Bruh 💀 Drop yours in the comments!
Medusa tweet media
English
30
0
44
5.9K
teflon
teflon@0xTeflon·
I wonder who caused this 🤔
teflon tweet media
English
1
0
6
1.8K
teflon
teflon@0xTeflon·
@Jhaddix what service do you use to get the gray scale customer logos on your site?
English
0
0
1
85