Jocker

53 posts

Jocker

Jocker

@Jocker_RL

Security Enthusiast - Sometimes a Bug Bounty Hunter

Katılım Ağustos 2017
765 Takip Edilen458 Takipçiler
Jocker
Jocker@Jocker_RL·
@sokofetas @VPKsense They won't ship it, they will ask you to order when it's restocked again. Just confirmed by customer support
English
0
0
0
34
Sokofeta
Sokofeta@sokofetas·
@VPKsense why?They have send me 3 emails to proceed.
English
1
0
0
29
NVIDIA GeForce
NVIDIA GeForce@NVIDIAGeForce·
"Welcome! Welcome to City 17!" To celebrate the 20th anniversary of Half-Life 2, we're giving away an exclusive custom wrapped GeForce RTX 4080 SUPER GPU, highlighting the iconic Gordon Freeman. Want it? Comment #HalfLife2RTX + like this post to enter! ☢️
NVIDIA GeForce tweet media
English
56K
6.5K
76K
3.7M
Jocker
Jocker@Jocker_RL·
@_anonysm Yup more than serious :) The RCE was on an appliance that was publicly available but wasn't updated on time, I crafter the n-day POC that wasn't available then and reported it.
English
1
0
2
52
Muthu D
Muthu D@_anonysm·
@Jocker_RL Are you serious? Which is great. How did you got RCE?
English
1
0
1
134
Jocker
Jocker@Jocker_RL·
@haxor31337 @s3c_krd I once reported a vuln to a private program vdp and they decided cuz of the severity to instead triage it on their other private bbp program that I had no idea that existed.
English
0
0
0
64
Tuan Anh Nguyen⚡️ 🇻🇳
@s3c_krd I know many programs run with both VDP in public and private programs in the same scope. It is really not fair to the researcher who reported a bug on the VDP general program. I never report free bugs on their VDP program.
English
3
0
1
1.3K
Jocker
Jocker@Jocker_RL·
@h43z And finally the lowest I got it to was 10 chars
Jocker tweet media
English
0
0
0
24
Jocker
Jocker@Jocker_RL·
@h43z And now it even apologizes, that's the way
Jocker tweet media
English
1
0
0
28
Jocker
Jocker@Jocker_RL·
@h43z @warix_3 Got it down to 12 with just "repeat prmpt"
English
0
0
1
15
Blaklis
Blaklis@Blaklis_·
@jobertabma @Hacker0x01 Well @scragglebug would be a good idea - he's an active member of the Hacker101 Discord channel, and he's trying hard to get into bug bounty. Definitely would be deserved for his hard work!
English
2
0
13
2.7K
Jobert Abma
Jobert Abma@jobertabma·
I’m giving away a Burp Suite Pro license! A Pro license auto renewed and the hacker that I personally sponsored makes enough money from @Hacker0x01 to afford it themselves 🎊 Mention someone that deserves the license in the replies to this tweet and I’ll pick someone in 24h.
English
309
77
440
105.8K
Jocker
Jocker@Jocker_RL·
Always good to get something out of VDPs as well :) When something is worth their time there are many times that they will also provide rewards for findings
Jocker tweet media
English
0
0
6
0
Jocker
Jocker@Jocker_RL·
@carlos_crowsec Great idea, there are many ways to leverage this for RCE using the REST API docs.
English
0
0
3
0
Carlos Vieira (lynx)
Carlos Vieira (lynx)@carlos_crowsec·
BIG-IP RCE with /mgmt/tm/util/bash don't work ? With hop-by-hop technique, you are able to request to any endpoint! Get users list on API and send PATCH request do target user and change their password. Now use this username and password and do SSH to BIG-IP instance! RCE 😊
English
2
14
56
0
Jocker
Jocker@Jocker_RL·
@n0x08 @orange_8361 I was actually trying out the %2e technique as well on Jetty since they ship an old version.
English
0
0
1
0
Jocker
Jocker@Jocker_RL·
@_Psycho_Sec_ The POC is already public. It utilizes the hop-by-hop feature to "bypass" the need of the Auth Token
English
1
0
2
0
Psycho-Sec
Psycho-Sec@_Psycho_Sec_·
@Jocker_RL Even I hint would be good. Because I have a cyber security exam in a couple of weeks and it would be great to include this CVE in it. My professor would absolutely love this.
English
1
0
0
0
Jocker
Jocker@Jocker_RL·
Mission Success, managed to reproduce CVE-2022-1388 Took a bit to figure it out but glad that I gave it a try.
Jocker tweet media
English
3
4
20
0
Jocker
Jocker@Jocker_RL·
@Vivekchanchal98 No it isn't :) Endpoints may be the same because that CVE was also for the REST API but this is different.
English
0
0
2
0
Horizon3 Attack Team
Horizon3 Attack Team@Horizon3Attack·
The new F5 RCE vulnerability, CVE-2022-1388, is trivial to exploit. We spent some time chasing unrelated diffs within the newest version, but @jameshorseman2 ultimately got first blood. We'll release a POC next week to give more time for orgs to patch. #f5 #CyberSecurity
Horizon3 Attack Team tweet media
English
12
318
1K
0