Sektor

6.8K posts

Sektor banner
Sektor

Sektor

@Debug_sec

bug bounty

Katılım Ocak 2023
1.3K Takip Edilen546 Takipçiler
Sektor retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
📶 𝗪𝗶𝗳𝗶𝗙𝗼𝗿𝗴𝗲 — 𝗪𝗶𝗙𝗶 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 𝗟𝗮𝗯 • Built on mininet-wifi • Simulates WiFi networks for testing • No real hardware required • Pre-configured attack labs • Safe environment for learning WiFi attacks ⚠️ Not stable, use in VM only github.com/blackhillsinfo… #CyberSecurity #WiFi #Pentesting
Vivek | Cybersecurity tweet media
English
0
52
323
8.8K
Daily News Iran
Daily News Iran@DailyNewsIran·
Something worst than covid is coming Mark my words
English
974
1.3K
8K
911K
Sektor retweetledi
rekdt
rekdt@rekdt·
The only way to stop hackers from hacking you is to hire hackers to hack you before the hackers you didn’t hire hack you
English
27
37
231
7.4K
Sektor
Sektor@Debug_sec·
Some people don’t believe in themselves anymore, they now fully depend on an Ai 🤖 for almost everything.
English
0
1
0
24
Sektor retweetledi
Sektor
Sektor@Debug_sec·
@7h3h4ckv157 Most people worst nightmares, especially people who don’t actually knows their crafts, but needs a fast route🤷
English
0
0
2
125
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
Manifesting 🤞🏻❤️
7h3h4ckv157 tweet media
English
45
146
1.9K
97K
Sektor
Sektor@Debug_sec·
@DurovPD I’ll buy Telegram and it’s owner 🚶🚶🚶
English
0
0
0
10
Sektor
Sektor@Debug_sec·
@Joyerz5 Gracious mercy, you are a good man, I think I’ll make you the head of IT in my company, let’s talk about your salary and other benefits, you will get 6 bitches every day, that’s a bonus and for a well documented report, free meals only on Fridays😏
English
0
0
0
6
Alex Younger
Alex Younger@AlextheYounga·
INSANE. People forget about cPanel but they still have a skyscraper in Houston
International Cyber Digest@IntCyberDigest

🚨 BREAKING: cPanel and WHM, the control panels behind an estimated 70+ million websites, have a critical security flaw that lets anyone become root admin without a password. CVE-2026-41940 affects every supported version. It’s already being exploited in the wild. watchTowr Labs published the full attack today, after the hosting company KnownHost confirmed the bug was already being used to break into a significant chunk of the internet. If you've never heard of cPanel: it's the dashboard that hosting providers and millions of website owners use to manage their servers, domains, email accounts, databases, and SSL certificates. WHM is the admin version that controls the entire server. If someone gets root access to WHM, they get the keys to the kingdom and to every apartment inside it. How the attack works, in plain English: 🔴 Step 1: The attacker sends a deliberately wrong login. cPanel still creates a temporary "you tried to log in" record on disk and gives the attacker a cookie tied to it. 🔴 Step 2: The attacker tweaks the cookie to disable cPanel's password encryption. Normally cPanel encrypts the password field on disk. With one small change to the cookie, cPanel just stores it as plain text instead. 🔴 Step 3: The attacker sends a fake login attempt where the password field secretly contains hidden line breaks. cPanel does not strip these line breaks out, so they get written straight to the session file. Each line break creates a brand new fake record. The attacker uses this to inject lines that say "this user is root" and "this user already authenticated successfully." 🔴 Step 4: The attacker visits one more random page on the site to nudge cPanel into re-reading the file. cPanel then promotes the injected fake lines into its main session memory. 🔴 Step 5: On the next request, cPanel sees a flag that says "this user already passed the password check." cPanel trusts that flag, skips checking the actual password, and lets the attacker in as root. From start to finish, the attack takes a handful of HTTP requests. If you run cPanel or WHM, the patched versions are: 🔴 cPanel/WHM 110.0.x → 11.110.0.97 🔴 cPanel/WHM 118.0.x → 11.118.0.63 🔴 cPanel/WHM 126.0.x → 11.126.0.54 🔴 cPanel/WHM 132.0.x → 11.132.0.29 🔴 cPanel/WHM 134.0.x → 11.134.0.20 🔴 cPanel/WHM 136.0.x → 11.136.0.5 If your version is older than these, assume someone has already broken in and act accordingly. Patch right now, then rotate every password and key the server touched: root passwords, API tokens, SSL private keys, SSH keys, mail passwords, and database passwords.

English
1
0
5
875
Sektor
Sektor@Debug_sec·
@Joyerz5 😏 name your price, you need to be rewarded for something I would have given enough attention to, and also higher experience people in the field, please don’t disclose the informations, I hope it’s not on the darkweb?🤧
English
1
0
0
15
🔍mrro0o0tt
🔍mrro0o0tt@Joyerz5·
@Debug_sec Of course dude! I can disclose all of your users actual date of birth that's private! Please pay🙃🙃
English
1
0
0
14
Sektor
Sektor@Debug_sec·
@Joyerz5 Can I take the ceo place, I’m good at the job than the actual CEO, disclose all your findings to me 😏
English
1
0
0
15
🔍mrro0o0tt
🔍mrro0o0tt@Joyerz5·
@Debug_sec I've lot more, thinking now what to do! But I am not gonna disclose, instead I will say to CEO I can disclose! 🫣😄
GIF
English
1
0
1
19
Sainath More
Sainath More@sainathm501·
Another one on the board $250 bounty this time. Small steps, but consistent progress in Web3 security. Same me. Just more learning, more patience, more consistency. This journey is just getting started. More coming..... @HackenProof
Sainath More tweet media
English
5
0
51
672
MrBeast
MrBeast@MrBeast·
If this tweet has exactly 1 like in 24 hours I’ll give that person $1,000,000
English
265.4K
31.2K
1.1M
68.4M
0xDamian
0xDamian@damnsec1·
The mental state of Bug Bounty Hunters after attempting to secure Microsoft/Windows:
English
3
5
40
2.1K
Sektor
Sektor@Debug_sec·
You are welcome bro🫡
English
0
0
0
37
Sektor
Sektor@Debug_sec·
Always read js files, you might find hardcoded keys inside it, to find this js files, you can use a tool called “LinkFinder”.
Sektor tweet mediaSektor tweet mediaSektor tweet mediaSektor tweet media
English
2
2
1
136
Sektor retweetledi
Medusa
Medusa@medusa_0xf·
Most applications allow users to upload a profile picture. Simple feature, right? But what if that upload functionality hides a critical SSRF vulnerability? In my latest video, I break down, step by step, how you can identify and exploit this issue. openyoutu.be/ZhtB01hbNMg?si…
Medusa tweet media
English
3
20
145
3.9K