Rohan

1.2K posts

Rohan

Rohan

@_Base_64

Security Researcher on HackerOne, Worked with over 100 organizations and ranked among the Top 100 globally.

Katılım Mayıs 2018
1.3K Takip Edilen2.7K Takipçiler
Sabitlenmiş Tweet
Rohan
Rohan@_Base_64·
Exciting News! Achieved a spot in the Top 100 hackers list on @Hacker0x01.
Rohan tweet media
English
17
2
107
7.5K
Rohan retweetledi
Calif
Calif@calif_io·
Google paid us $57,000 for two bugs in Chrome. We’re not doing this for the bounty, but it’s always fun to get rewarded. These bugs were found using nothing fancier than a $20/month AI subscription. If you’re curious, come check out our talk at the Real World AI Security Conference at Stanford: seclab.stanford.edu/RealWorldAIsec/ We haven’t published the Chrome bugs in our MAD Bugs series. They work better as part of something even more fun, stay tuned!
Calif tweet media
English
19
99
1.1K
76.8K
Rohan
Rohan@_Base_64·
@AkashHamal0x01 One of my favourite programs moved from HackerOne to Bugcrowd, and it ended up taking around three months just to triage one report. After that experience, I decided to stop working on the program.
English
1
0
2
255
root@AkashHamal0x01:~/ # 🇵🇭
root@AkashHamal0x01:~/ # 🇵🇭@AkashHamal0x01·
> Provide Cleanest POC, get informative > Contact security team via Email, provide some insights of report and impact > Triaged after 3 days So how hard was it reproduce the report? i provided python POC, screenshots and everything , nothing stopped triage from making it info
root@AkashHamal0x01:~/ # 🇵🇭 tweet mediaroot@AkashHamal0x01:~/ # 🇵🇭 tweet media
root@AkashHamal0x01:~/ # 🇵🇭@AkashHamal0x01

Hunting on Bugcrowd be like : - 1 week gaps between replies = late triage - No manual severity? Found a vulnerability that is P2 or P1 but impact is not in VRT category? congratulations you cannot select severity and now your report will take like 1 week to be seen

English
6
2
77
6.7K
Rohan retweetledi
Masonhck357
Masonhck357@Masonhck3571·
Oh we do. I was just about to make a post on how this is reminiscent of when Nuclei came out. People were literally spamming anything Nuclei spat out as low severity or higher. Imagine an open scope vdp program and imagine all the results. Now imagine 50+ hackers doing the same and reporting the exact same nuclei results. Now this feels exactly the same, but much worse. Getting no results on Nuclei eventually pushed you to abandon the tool and learn web app, if you wanted to be successful. I really don’t see beginners willing to abandon Claude to learn and understand web applications and testing strategies. Of course a few will, but in my 5 years of triage, I can almost guarantee that most won’t. And those people will be the first casualties of AI.
Michael Blake@Michael1026H1

Agents feel like the next Nuclei. Can be very helpful, but results really depend on customization and where you point it. I also expect a triagers will be dealing with a lot of reports that the reporter doesn't understand.

English
2
7
72
6.8K
Rohan retweetledi
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
At @yeswehack, we use AI to solve security problems, not to harvest human intelligence. 🤖 Our rollout of AI features is grounded in non-negotiable principles 👇 🤝 AI where it helps, humans where it matters – automating repetitive tasks while experts focus on complex challenges and customer context 🧑‍💻 Humans-in-the-loop, always – augmenting analysts, but critical decisions remain firmly in human hands 🛡️ Customers in control – empowering security teams to choose which features to use, on their terms Find out more: yeswehack.com/product/ai-vul…
YesWeHack ⠵ tweet media
English
7
11
121
5.6K
Rohan retweetledi
Tib3rius
Tib3rius@0xTib3rius·
Just heard about HackerOne allegedly training an AI pentesting agent on private bug bounty reports. Which is great news. I’ve always wanted to be part of something bigger than myself. Like a dataset. I logged into the platform to review one of my old private reports. The one with the 47-step reproduction chain and the custom Burp extension I wrote at 2:13am. It now feels less like a finding. More like a contribution to the collective. Some people are upset that private reports might be used to train an AI. I prefer to think of it as mentorship. I walked so the model could run automated recon at scale. That’s legacy. The platform says it’s trained on years of proprietary exploit intelligence. Which sounds suspiciously like “stuff we already did.” But I appreciate the rebrand. I used to be a hacker. Now I’m pre-training data. Career growth. I checked my dashboard to see if I get royalties. There is no royalties tab. But there is a leaderboard. I assume the AI is climbing it. I hope it enjoys the hoodie. A few researchers are worried this devalues human work. I disagree. My work has never been more valuable. It’s now infinitely reusable. Like a zero-day sourdough starter. I submit vulnerability reports. The AI absorbs them. The AI pentests the same targets next quarter. Somewhere in there is synergy. Or recursion. Hard to tell. I asked support if the AI will be submitting duplicate reports based on patterns it learned from mine. They said the system is designed to enhance signal. I respect that. Nothing enhances signal like automation replaying my exact payloads at machine speed. I’ve decided to lean into this. From now on, I will optimize my reports for model readability. Clear headings. Concise PoCs. Structured exploitation paths. If I can’t win the bounty, I can at least improve the weights. This is what scale looks like. The future of bug bounty is continuous, AI-driven testing powered by historical exploit intelligence. Which is a very elegant way of saying: “Remember that bug you found? It found you back.” I’m proud to be part of the ecosystem. Even if the ecosystem is now pentesting itself. Submitting my next report tonight. For training purposes.
English
29
28
382
33K
Rohan
Rohan@_Base_64·
@roohaa_n Of all the possible names, they went with Biscuit Security?🤣
English
1
0
3
351
Rohan retweetledi
nabbo (bio/acc)
nabbo (bio/acc)@TensorTwerker·
made my first website, go check it out: http://127.0.0.1:5500/index.html
nabbo (bio/acc) tweet media
English
102
26
1.1K
44.9K
Rohan retweetledi
Kirill Firsov
Kirill Firsov@k_firsov·
How to access servers behind Cloudflare by bypassing the firewall? @FearsOff #bugbountytips #cloudflare #firewall #bypass 1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.
Kirill Firsov tweet media
English
11
171
1K
111.8K
Rohan retweetledi
Amr
Amr@Gomawyy·
Another dublicate
Amr tweet media
English
7
10
88
4K
Rohan retweetledi
Oluwatobi Mustapha
Oluwatobi Mustapha@Oluwatobi_Msp·
New to cybersecurity and don’t want to learn alone? I’ve created a WhatsApp group for beginners to connect, share ideas, and grow together in a supportive space. If that sounds like what you need, drop a comment and I’ll send you the invite link.
Oluwatobi Mustapha tweet media
English
1.4K
85
797
91.1K
0xb4tm4n
0xb4tm4n@b4tm4Nx0·
@_Base_64 @Hacker0x01 Today I was just tracking my shipment and found a XSS bug 😆 That's my first valid bug......But unfortunately the company doesn't have any BBP or VDP, however I reported them through their email.
English
1
0
1
25
Rohan
Rohan@_Base_64·
Just realized I’ve reached 15K rep on @Hacker0x01 ! 🥳
Rohan tweet media
English
4
0
142
5.3K
Rohan
Rohan@_Base_64·
@b4tm4Nx0 @Hacker0x01 Thanks :). It takes time to find the first bug, but be persistent, and you will definitely find your first bug. Focus on one vulnerability for now and look everywhere.
English
1
0
1
29
Rohan
Rohan@_Base_64·
@ken_kigotho Keep working, brother. That day will come soon.
English
1
0
1
101
cholo
cholo@awaisaskanii·
@_Base_64 @Hacker0x01 AAP ne Pakistan m kon se payment option chose kiya hai like bank, crypto etc ?
HT
1
0
1
124
Rohan
Rohan@_Base_64·
Yay, I was awarded a $69,696.9 bounty on @Hacker0x01 . Bug: Access to server credentials by threatening developer at gunpoint.
English
70
130
1.4K
0