MR404NTF

369 posts

MR404NTF banner
MR404NTF

MR404NTF

@M404ntf

Linux Sysadmin | I can solve the mystery in Scooby-Doo before it is revealed! | https://t.co/FQ7YZdCqgq

Canada🇨🇦 Katılım Şubat 2020
82 Takip Edilen1K Takipçiler
MR404NTF retweetledi
KeepSec Technologies
KeepSec Technologies@keep_sec·
We have been nominated by @openinfradev for the Superuser Awards, vote for us with the link in replies!
KeepSec Technologies tweet media
English
1
2
3
238
MR404NTF retweetledi
Trickest
Trickest@trick3st·
Introducingggggg... 🥁 Generate thousands of URL path combos in seconds, perfect for generating brute force wordlists! mkpath! This tool is similar to mksub, but it works for URL path combinations instead of subdomains. github.com/trickest/mkpath
Trickest tweet media
English
5
107
313
0
MR404NTF retweetledi
Stephan Berger
Stephan Berger@malmoeb·
1/ #Linux #Forensics: pssst... I will now reveal my favorite interview question for candidates who want to work in our IR team ;) "In the process list, I see a (running) binary, but the binary is no longer present on disc. How can I restore the original binary? (screenshot 👇)"
Stephan Berger tweet media
English
35
198
943
0
MR404NTF retweetledi
JS0N Haddix
JS0N Haddix@Jhaddix·
🧵Another hacker story thread! 🧵 == The Medical Alert Hack == Not too long ago I put a whole city on high alert during a security assessment. A tale of caution. 💀 Read along to learn my approach & mistakes! 🚨Retweet, follow, & like for more hacker stories! 🚨 1/x 👇🏼
English
27
192
811
0
MR404NTF retweetledi
Corben Leo
Corben Leo@hacker_·
Hacking CAN be easy. But, often it's not. Let's develop your technical skills, they obviously matter. A roadmap:
English
133
821
3.2K
0
MR404NTF retweetledi
Chevy Phillip
Chevy Phillip@chevyphillip·
Recent P1 bug I found: 1. App allowed admin to create GitHub profile with access token. 2. User is only allowed to call to external url based on admin config. 3. App uses graphql 4. Found endpoint to generate a user jwt 5. Used query to dump graphql data.
English
6
48
188
0
MR404NTF retweetledi
Nagli
Nagli@galnagli·
Expand your attack surface by grabbing SSL certificates from ip addresses, match these with your Bug Bounty targets. I'd recommend running this technique on cloud providers such as AWS/Azure/GCP ranges using github.com/glebarez/cero cero [CIDR] (cero 0.0.0.0/0) #bugbountytips
English
5
151
370
0
MR404NTF retweetledi
Alex Birsan
Alex Birsan@alxbrsn·
bypassing this WAF like
Alex Birsan tweet media
English
8
81
772
0
MR404NTF retweetledi
shubs
shubs@infosec_au·
The Assetnote security research team discovered a full-read SSRF vulnerability in Jamf Pro (post-authentication) a few months ago. blog.assetnote.io/2021/11/30/jam… (CVE-2021-39303 & CVE-2021-40809). Tracing sinks to sources is always a valid strategy.
English
5
89
275
0