caon

79 posts

caon

caon

@_caon__

Katılım Aralık 2022
206 Takip Edilen727 Takipçiler
caon
caon@_caon__·
@arthurair_es Inspiração!! Parabéns pela trajetória, que venham muitos os LHEs e oportunidades ano que vem :)
Português
1
0
1
136
arthur aires
arthur aires@arthurair_es·
how it started (2020) how it’s going (2025) I’m not great at telling stories, but I wanted to share a little bit of my journey. The first photo is from 2020. That was me at the prep course where I studied, covered in eggs and flour, celebrating after finding out I had passed the entrance exam for a federal medical school. I spent almost two years studying full-time after high school, doing mock tests, reviewing everything, and pushing as hard as I could. In the end, it worked. I got in for the 2019 to 2020 intake. The second photo is from my white coat ceremony. The Hippocratic oath, the tradition before officially starting medical school, that moment when everything feels like the beginning of a lifelong career. Then the pandemic hit. Classes stopped and everything shut down. I needed to find a way to help my family because things were not easy. While searching online, I found HackerOne and learned that it was actually possible to hack companies legally and get paid in USD for it. Since I was stuck at home with a lot of free time, I started studying everything I could. Lots of failed attempts, countless nights, and a lot of frustration… until February 28th, 2021, when I finally got my first bounty. A few months later, on May 9th, 2022, I received my first Live Hacking Event invitation for H1-303. I couldn’t go because I didn’t have a US visa yet. But on June 10th, 2022, I was invited to H1-702, and that time I made it. The third photo is from that event. I met incredible people who became close friends and huge inspirations. That was the turning point when I realized my future wasn’t in medicine. I had a long conversation with my parents about my decision. It wasn’t easy, but it was the right one. The last photo is from the most recent LHE I attended, H1-468 in Sweden. It was one of the most special events I’ve ever been part of. I met new people, reunited with old friends, learned a ton, and felt genuinely proud of how far things have come since that first picture back in 2020. Getting invited to LHEs still makes me genuinely happy. Not only because of the event itself, but because every invitation reminds me of where I started, how many things went wrong before anything went right, and how grateful I am for everything this path gave me and my family. 2020 to 2025. What a ride. And I’m just getting started 🚀🖤.
arthur aires tweet mediaarthur aires tweet mediaarthur aires tweet mediaarthur aires tweet media
invoke-virtual {Dai}, 黛安娜 🏴‍☠️@wh0isdxk

how it started (2017) how its going (2025) era 2016, eu trabalhava no mercado de gamedev mobile e descobri que existiam oportunidades pra área de segurança aqui no Brasil fui atrás, comecei a estudar, deixava até de comer pra comprar material da área, na época era ainda mais difícil de achar conteúdo sobre, a comunidade tb era bem fechada… na época eu cursava engenharia da computação integral, tinha a empresa jr. do curso que ajudei a fundar com meus amigos, e o trabalho nos intervalos que não tinha aula. tive burnout aos 20 e poucos anos, mas aqui entra o papo de obsessão… eu não me via em outro lugar, eu precisava estar ali. em 2017 ia ter um evento em sp, era minha oportunidade de conhecer mais de perto e fazer networking, não tinha grana pra isso, então decidi inscrever uma ideia que eu tinha há tempos numa feira da faculdade (estudava na UTFPR). ganhei segundo lugar, o prêmio era usar o valor justamente pra eventos e capacitação, e eu fui ♥️ (inclusive tô lá no aftermovie do roadsec 2017 haha) eu só conhecia a banda que ia tocar, e saí de lá conhecendo uma galera e com A MAIOR CERTEZA da minha vida, eu ia trabalhar na área. o tempo passou, continuei estudando, consegui meu primeiro trampo como analista de segurança, na época nem existiam as divisões do infosec color wheel que temos hoje, eram dois macros, red e blue team, e éramos bem generalistas, tinha que saber de tudo, dificilmente alguém entrava direto na área. segui trabalhando em fintechs, continuei com meu amor por mobile, só que em outra visão, comecei palestrar e dividir conhecimento, escrever, jogar ctf, e me fazer mais presente. muitos anos se passaram, comecei a ser chamada como Keynote, conheci inúmeras pessoas de fora, atuei em projetos incríveis, comecei a contribuir num projeto global, e sempre seguindo… minha família estudou só até a terceira série, então pra mim tudo isso é surreal… fui mais longe do que qualquer um já foi, e essa é a minha maior motivação para compartilhar o que aprendo e estudo. estudar muda vidas. e é só o começo, se Deus quiser e permitir. a vida não é fácil, tudo isso rolava enquanto uma outra parte da minha vida era impossível, mas aos poucos a gente vai moldando a nossa vida. fé. ♥️

English
8
0
46
3.6K
caon retweetledi
Alex Moshkov
Alex Moshkov@amoshkov·
🟥 Positive Hack Talks → São Paulo 🇧🇷 Dec 10th, 2025 🗣️ Speakers — submit papers (flights/hotel covered). CFP link in thread 👇 💻 Cybersecurity community — join our most community-driven event. ➡️ phtalks.ptsecurity.com/saopaulo Free · 8 talks · limited spots #PHTalks
Alex Moshkov tweet media
English
3
34
87
17.7K
caon
caon@_caon__·
Ótima oportunidade para a comunidade! 🚨 LHE – Mercado Livre Hacking Event 2025 🚨 🗓 25/10 a 01/11 Escopo ampliado, desafios, bounties e premiações exclusivas! Inscreva-se: forms.gle/Cs35PeYcoGsm8e…
Português
2
2
17
3.1K
sw33tLie
sw33tLie@sw33tLie·
Anyone knows how to change the force touch behavior on the Macbook Pro trackpad to make it send the selected text to an LLM rather than searching a word on the dictionary? Surely that'd be much more useful 🤔
English
1
0
5
1.7K
caon retweetledi
Caido
Caido@CaidoIO·
Hackers, To make our pricing fairer worldwide, we’re trying out localized pricing. We’re starting with Brazil 🇧🇷, with Individual plan prices dropping by about 50%. 💸 Monthly: ~110 BRL → 55 BRL 💸 Yearly: ~1,100 BRL → 550 BRL Which country should we do next? caido.io/blog/2025-08-2…
English
47
27
315
35.5K
caon retweetledi
Masato Kinugawa
Masato Kinugawa@kinugawamasato·
I don't know who this will help but I put together a page listing JavaScript APIs that can break Shadow DOM encapsulation :) github.com/masatokinugawa…
English
2
51
208
18.4K
caon retweetledi
André Baptista
André Baptista@0xacb·
Try this out on your next target! Some more gold from the guys at @ctbbpodcast! 🔥
André Baptista tweet media
English
2
48
282
16.8K
caon retweetledi
Sergey Toshin
Sergey Toshin@_bagipro·
New Android host validation bypass technique! [1/4] All parsed URIs in Android are android.net.Uri.StringUri objects. However, the scheme parser only looks for the ":" delimiter
Sergey Toshin tweet mediaSergey Toshin tweet mediaSergey Toshin tweet media
English
5
73
299
28.1K
caon retweetledi
Web Security Academy
Web Security Academy@WebSecAcademy·
How to find viable targets for client-side desync attacks: 1️⃣ Open Burp Suite and intercept requests. 2️⃣ Choose an endpoint that wouldn't usually expect a POST request (e.g GET) and send it to repeater. 3️⃣ Go to Inspector > Request Attributes > Protocol field > Upgrade to HTTP/2. 4️⃣ Send the Modified Request and look for this error message: "Server ALPN does not advertise HTTP/2 support"... 5️⃣ Enable ALPN Override in request settings and send again. If you see "Stream failed to close correctly" then you've confirmed that the server does not support HTTP/2 and is a valid target for desync testing! Want to learn more about desync attacks? On August 6, at Black Hat USA, James Kettle from PortSwigger Research will reveal new classes of desync attack that enabled him to compromise multiple CDNs and kick off the desync endgame! 😲 Stay up to date here: http1mustdie.com
English
3
52
342
16.3K
caon retweetledi
André Baptista
André Baptista@0xacb·
If the origin server treats a delimiter, but the cache doesn’t and the cache normalizes paths before applying static directory rules you can leverage path traversal! Take this payload: /myAccount$/..%2Fstatic/any - The cache sees: /static/any - The origin sees: /myAccount The response for /myAccount is cached under /static/any and anyone that visits that static URL gets leaked data.
André Baptista tweet media
English
1
67
340
16.2K
caon retweetledi
André Baptista
André Baptista@0xacb·
RFC 2047 "encoded-word" is crazy! It lets you smuggle encoded payloads into email addresses and the craziest thing is that some parsers decode it before validation 👇 Shout out to @garethheyes for this  🔥
English
5
70
446
32.4K