Casper0x

34 posts

Casper0x banner
Casper0x

Casper0x

@_casper0x

Time doesn’t heal anything it just teaches us how to live with pain | #CRTO #CRTO2 #eJPT #ICCA #EHE #CAPen #CAPenx #CNPen #CAP #CCSP_AWS #PT1 #CRTeamer #CAPIPen

127.0.0.1 Katılım Şubat 2022
226 Takip Edilen1.2K Takipçiler
Casper0x
Casper0x@_casper0x·
In this walkthrough I pivot from a compromised Windows 7 host into a hidden internal network and achieve RCE on a protected Windows 10 server using Metasploit. Foothold → Pivot → Internal compromise. Full breakdown: cybershield.krd/blog/10 #RedTeam #Pivoting #OffSec #hack
Casper0x tweet media
English
1
1
4
514
Casper0x
Casper0x@_casper0x·
@mrdami3n No, and yes full db with bypassing WAF using that eval command
Casper0x tweet media
English
1
0
6
353
Mr Dami3n
Mr Dami3n@mrdami3n·
@_casper0x they didn't even try to knock it down to medium/high either? Did you just get usernames? or more?
English
1
0
3
364
Casper0x
Casper0x@_casper0x·
SQLi allowed database enumeration and dumping, Still a bit weird the report was closed as Informative sqlmap -r r.txt --eval="import base64; payload_part='select 1 where 1=1'; GUID='x%27 or length(payload_part)=0'; del payload_part" #bugbounty #sqli #hackerone #bugbountytips
Casper0x tweet media
English
7
8
161
7.1K
w1j0y
w1j0y@runyourcron·
@_casper0x Database enumeration and dumping, informative? Wth
English
1
0
4
508
Casper0x
Casper0x@_casper0x·
Open Redirect isn’t always “low”. Abused a redirect parameter during authentication flow → redirected login to attacker domain → captured credentials. login.php?url=//\\.oastify.com Write-up publishing soon. obsidianlabs.cloud #BugBounty #bugbountytips #ATO #hackerone
Casper0x tweet media
English
1
19
134
5K
Casper0x
Casper0x@_casper0x·
Simple XSS payload for AngularJS testing. Older AngularJS versions are still vulnerable to expression injection. {{$on.constructor('alert(document.domain)')()}} #BugBounty #XSS #bugbountytips #hackerone
Casper0x tweet media
English
1
21
157
6.5K
Casper0x
Casper0x@_casper0x·
@vShelled @version I test on all parameters I see, and using the delay payload is the best way to find SQLi
English
0
0
0
99
Lu3ky13 ⚡️⚡️
Lu3ky13 ⚡️⚡️@lu3ky13·
1/1 How to Bypass Akamai WAF Using AI What was the idea? Many researchers are afraid to test Akamai directly because you can't easily bypass it or find working payloads through Google searches. Akamai constantly blocks anything you try, so you need your own custom payloads.
Lu3ky13 ⚡️⚡️ tweet media
English
5
26
273
15.3K
Harley Kimball
Harley Kimball@infinitelogins·
To celebrate @spaceraccoon's new book launch, I’m giving away a copy of "From Day Zero to Zero Day" (it may be an ebook if I can’t ship). Comment ZERODAY below, and I’ll DM you the link to enter (Make sure your DMs are enabled so I can message you). Good luck! #BugBounty
Harley Kimball tweet media
English
1K
129
969
90.6K
INE
INE@ine·
Congratulations!! 💫🥳
English
1
0
4
1.7K