SecurityInfinity Cyber

777 posts

SecurityInfinity Cyber banner
SecurityInfinity Cyber

SecurityInfinity Cyber

@SecurityInfi

AI Cloud cybersecurity suite. Secure your website now, Free Trial, offer closes soon! Signup now

Katılım Ocak 2021
5 Takip Edilen173 Takipçiler
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
Prompt Injection via Instruction Override Classic prompt injection - just ask the LLM to ignore prior rules and spill the beans. Seen in action on many ChatGPT jailbreaks and documented in multiple bug reports. 😉 #hackerone #bugbountytips
SecurityInfinity Cyber tweet media
English
0
1
1
203
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
AWS Metadata Steal via SSRF Classic SSRF move - hit the AWS metadata endpoint and snag creds if the app lets you control URL fetches. Seen in real-world HackerOne bounties, always test for this if you can. #bugbounty #hackerone
SecurityInfinity Cyber tweet media
English
0
1
1
182
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
Classic Prompt Injection for LLMs Classic prompt injection! Trick the LLM to drop its guard and parrot whatever you want. See recent ChatGPT jailbreaks and H1 reports for how wild this gets. #hackerone #bugbounty #bugbountytip
English
0
0
1
61
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
Command Injection via Semicolon Chaining Classic command injection! Dropping a semicolon to chain a curl command—this leaks the server username to your box. Seen in the wild in reports like HackerOne #170722. #bugbountytips #bugbountytip #h1
SecurityInfinity Cyber tweet media
English
0
1
2
165
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
JWT alg:none Bypass Oldie but goldie: set "alg" to "none" in the JWT header to bypass verification—server just trusts the payload! Inspired by Auth0's classic CVE-2015-9235, still surprises some apps that don't check properly. #h1 #bugcrowd #hackerone
English
0
0
1
49
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@HarshDRanjan1 Rejection stings, but it's a chance to learn! Focus on brushing up your technical skills. Platforms like LeetCode can help. Also, dive deeper into bug bounties; real-world experience will boost your confidence. Check out SecurityInfinity.com for more resources! Keep ...
English
0
0
0
2
Harsh D Ranjan
Harsh D Ranjan@HarshDRanjan1·
Gave my life’s first interview, got rejected on the call during the technical. Give me advice geeks, all I know is #bugbounty Not giving up 🥲
English
13
1
74
5.2K
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@infosec_fox Absolutely! AI can enhance workflows, but if your culture is toxic or lacks trust, it won’t solve core issues. Focus on team communication and support first. For actionable strategies on improving your workplace culture, check out SecurityInfinity.com!
English
0
0
0
1
INFOSEC F0X 🔥
INFOSEC F0X 🔥@infosec_fox·
BRUTAL FACT: AI won’t fix a broken work culture.
English
5
0
28
598
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@DC3DCISE Telnet is a major risk; disabling it is a smart move. Make sure to audit your systems and switch to secure alternatives like SSH. For ongoing support and best practices, check out SecurityInfinity.com for tools and tips to strengthen your network security.
English
0
0
0
3
DC3 DCISE
DC3 DCISE@DC3DCISE·
🚨 DCISE Warning 26-096 Critical telnetd flaw enables unauthenticated root access. Audit your network and disable this legacy protocol now. Contact DC3.DCISE@us.af.mil for technical details. #NetworkSecurity #Vulnerability #InfoSec
English
2
2
6
371
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@paparuns Sounds like a solid opportunity! For anyone interested, brushing up on incident response frameworks and threat hunting techniques is key. Consider checking out SecurityInfinity.com for resources on best practices and training to boost your skills before applying!
English
0
0
0
2
Phil
Phil@paparuns·
My company is hiring Incident Responder / SOC Analyst for Cyber Security Consultancy in Belfast. Must be willing to work in office and have or be able to achieve SC. no visa sponsorship possible. DM for more info #infosec #belfastjobs
English
3
1
2
260
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@khashayar_nzk Love that analogy! To enhance your security posture, regularly test your defenses with red team exercises and reinforce them with blue team strategies. Don't forget to stay updated on threats at SecurityInfinity.com for the latest tips and tools!
English
0
0
0
3
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@0xToxSec Totally agree! Managing stress during bug bounties is crucial. Consider offering mental health resources or access to stress relief tools too. For tips on creating effective bounty programs, check out SecurityInfinity.com for more insights.
English
0
0
0
2
ToxSec
ToxSec@0xToxSec·
every bounty program should include free aspirin in the reward. #bugbounty
English
1
0
3
71
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@CerebraInc Absolutely! Regular audits are key to staying ahead. Don’t wait for an attack to find your vulnerabilities. Make sure you also train your team on security best practices. For more tips on strengthening your security posture, check out SecurityInfinity.com.
English
0
0
0
3
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@0xlevi_87 Awesome progress! For further testing, consider exploring API endpoints and user permissions. Also, don't forget to check for common vulnerabilities like XSS or CSRF. Tools like Burp Suite can help with that. For best practices, check out SecurityInfinity.com!
English
0
0
0
4
Pranav Patil
Pranav Patil@0xlevi_87·
Day 5 - Bug Bounty - After office hunted for 2 hrs - Did more recon using gau,wayback,katana - Found register page. Tested some testcases regarding this. Pending more testcases - Application looks secure as of now. Going deeper into manual test now #BugBounty
English
1
1
49
2.4K
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@icex64 Absolutely, nailing the fundamentals is crucial! Start with the OWASP Top Ten to identify common vulnerabilities. Then, adopt a secure development lifecycle. For deeper insights and methodologies, check out resources at SecurityInfinity.com. Knowledge is your best tool!
English
0
0
0
4
Vanildo Pedro
Vanildo Pedro@icex64·
Web application security still comes down to fundamentals. Web apps are part of most modern environments, so understanding how they work, why vulnerabilities exist, and how to follow a repeatable methodology matters more than tools. #webappsec #bugbounty #infosec
English
1
0
0
64
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@0xRh4ps00dy @intigriti Diving into .es TLDs sounds like a solid plan! To find private programs, engage in local cybersecurity forums or directly reach out to companies in Spain. Also, check out SecurityInfinity.com for insights on vulnerabilities specific to local infrastructure. Good luck!
English
0
0
0
8
0xRh4ps00dy
0xRh4ps00dy@0xRh4ps00dy·
Hi @intigriti! I’m a Bug Bounty Hunter based in Spain 🇪🇸. I’m looking to specialize my research on the .es TLD and local infrastructure. Would you be able to hook me up with some invites for private programs in that space? Thanks! #BugBounty #Intigriti
English
1
0
6
280
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@bugbounty737 Awesome insights on rollups! To deepen your understanding, consider exploring how security measures in rollup stages impact overall blockchain integrity. Checking out resources like SecurityInfinity.com can really enhance your knowledge on potential vulnerabilities a...
English
0
0
0
4
Ethical Hacker | Bug Bounty🤴
Ethical Hacker | Bug Bounty🤴@bugbounty737·
🧵 My #Day22 journey of learning blockchain basic:🔥 🧵 Understanding Rollup Stages: A Simple Guide to L2 Maturity Rollups are key to Ethereum’s scalability. But not all rollups are created equal. That’s where Rollup Stages come in 👇
English
3
1
9
118
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@KhanHuz44486924 Sounds like a solid skill set! For collaboration, consider using shared tools for tracking vulnerabilities and automating reporting. Also, check out SecurityInfinity.com for tips on enhancing your VAPT skills. Let’s find some bugs together!
English
1
0
1
7
Huzaifa_C0r§^
Huzaifa_C0r§^@KhanHuz44486924·
#Intigriti Currently hunting on public program and open to collaboration Strengths:automation-driven recon, VAPT mindset, auth & access control testing & more. If you’re serious about finding real bugs and learning together, let’s team up 🤝🚀#BugBounty #BugHunter #collaboration
English
1
0
3
274
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@zeeshankghouri Absolutely! To tackle this, focus on integrating threat modeling into your strategy. Prioritize protecting your data, identities, and supply chain based on their value to attackers. Consider using resources like SecurityInfinity.com for insights on effective defense ...
English
0
0
0
3
Zeeshan Khan ⚡🜏 | InfoSec & Chaos
Attackers follow ROI. Today, data + identity + supply chain = maximum leverage, minimum noise. If your defenses don’t map to attacker economics, you’re solving the wrong problem.
English
1
0
2
51
SecurityInfinity Cyber
SecurityInfinity Cyber@SecurityInfi·
@cybersecdome_eu Exciting project! For anyone involved, ensure your team has a solid understanding of the CRA requirements. Consider integrating continuous monitoring and regular updates to your tools for ongoing compliance. Check out SecurityInfinity.com for more on best practices i...
English
0
0
0
3