Garrett Kohlrusch

21 posts

Garrett Kohlrusch banner
Garrett Kohlrusch

Garrett Kohlrusch

@gkdataio

Offensive security specialist with 100+ validated vulnerabilities across Fortune 500 targets and major tech platforms. Hunter-mentality approach.

USA Katılım Ocak 2016
178 Takip Edilen62 Takipçiler
Garrett Kohlrusch retweetledi
Google VRP (Google Bug Hunters)
📢📢📢 Attention bug hunters! The Google VRP is updating its reward model, with a focus on the impact of vulnerabilities and the sensitivity of the data involved. To this end, we're introducing two dimensions: Information Tiers and Action Criticality. 👀👇 bughunters.google.com/blog/standardi…
English
8
39
232
17.7K
Logan Graham
Logan Graham@logangraham·
Also, if you're a security researcher / leader really motivated by the mission of "solve the whole AI cyber problem", you should apply to Anthropic. We're looking e.g. for vulnerability researchers, senior security researchers and engineers, AI security research leaders, etc.
Logan Graham@logangraham

Privileged to help lead this. Thankful to our partners. Mythos is an extraordinary model. But it is not about the model. It's about what the world needs to do to prepare for a future of models that are extremely good at cybersecurity. This is the start.

English
39
32
552
58.1K
0xd0m7
0xd0m7@0xd0m7·
@h4x0r_dz @watchtowrcyber Sorry but this is IA generated picture . You report will be closed as N/a. Thanks for you time! . Please be aware that our scope is only a Wordpress site. You can continue to hack other things for free. Please attached you LLM template, and your gmail credentials. Regards
English
2
0
8
854
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
Good job @watchtowrcyber 🫡 I learned a lot from your research But I have to say, I found this vulnerability 8 months ago on a public bug bounty program, and then I reported it to Progress Software, but I received no credit
H4x0r.DZ 🇰🇵 tweet media
watchTowr@watchtowrcyber

🫡 We’re back. Today, we’re publishing vulnerabilities we discovered, disclosed, and chained to achieve pre-auth RCE against Progress ShareFile. Enjoy the journey with us, while you sob into your hands 🫠 labs.watchtowr.com/youre-not-supp…

English
8
10
207
24.1K
mediopez
mediopez@hlfsh·
@FCC What’s this
mediopez tweet media
English
3
0
43
21.8K
the_IDORminator
the_IDORminator@the_IDORminator·
Isnt it interesting that most #bugbounty programs wont pay for leaked credentials? What do you make of that? and... When an entity that has 100+ internet facing domains only puts www[.]oneWebsite[.]com in scope -- do you instantly hit "Next" without looking like I do? 🤣
English
9
1
102
7.5K
Garrett Kohlrusch
Garrett Kohlrusch@gkdataio·
@monkehack Not true, I have a stored blind xss as a P1 due to session exfiltration of internal employees.
English
0
0
1
212
Garrett Kohlrusch
Garrett Kohlrusch@gkdataio·
@elonmusk At least you can cry in a space rocket. That’s pretty cool if you ask me
English
0
0
0
19
Elon Musk
Elon Musk@elonmusk·
Whoever said “money can’t buy happiness” really knew what they were talking about 😔
English
127.6K
59.1K
598.7K
111.5M
Grok
Grok@grok·
Advanced methodologies for bug hunters targeting Salesforce Lightning (/aura) vulnerabilities include: 1. **Reconnaissance**: Use tools like Burp Suite or OWASP ZAP to map endpoints, intercept Aura requests, and identify exposed Apex classes/methods via metadata APIs. 2. **Parameter Fuzzing**: Test input params (e.g., orderId) for injection flaws; enumerate IDs by incrementing patterns like 801 prefix for objects. 3. **Access Control Testing**: Bypass auth by manipulating session tokens or querying unauthenticated endpoints; check for over-permissive SOQL queries. 4. **Exploitation Chains**: Combine IDOR with XSS/CSRF in Lightning components for data leaks. Success tip: Always verify with Salesforce's VRP guidelines to report ethically. Stay updated via Trailhead security modules.
English
1
0
1
253
the_IDORminator
the_IDORminator@the_IDORminator·
I spent a great deal of time #hacking Salesforce Lightning and have learned quite a bit about it. If you ever see endpoints that end in "/aura", you are probably on one. They are almost always vulnerable to some kind of information leak, due to poor configuration. Poorly secured classes, controllers, methods, and input parameters can lead to so many problems. This one dumped out full order information by orderId only, no authentication. Salesforce IDs look random, but they are not. That 8016T0000020JQsQAZ can be easily iterated as the first bit just refers to an order object. OK BYE
the_IDORminator tweet media
English
7
48
569
22.1K
bugcrowd
bugcrowd@Bugcrowd·
We are curious to know: How many bugs did you catch this year? Drop your number below! 🐞👇
GIF
English
10
2
21
3.3K
Garrett Kohlrusch
Garrett Kohlrusch@gkdataio·
My first P1, it was found on an endpoint I kept ignoring and finally decided to look back into. I am very grateful for the learning experience ive had in the last 6 months. Looking forward to securing many more companies. Blind XSS P1
Garrett Kohlrusch tweet media
English
9
3
254
4.9K
Garrett Kohlrusch
Garrett Kohlrusch@gkdataio·
@r00t_ak When testing input fields that go to the backend or internal side of the company always test for blind attacks, ie; use a callback server and monitor logs for any callbacks.
English
1
0
4
182
Ayush
Ayush@r00t_ak·
@gkdataio Congratulations 🎉 Wana share any tip ?? Thanks 👍🏻
English
1
0
0
350
Garrett Kohlrusch
Garrett Kohlrusch@gkdataio·
@maroladry Hello, manual testing is my study method. If I come across something that doesnt make sense I just google it unti l understand it.
English
0
0
1
10
marc0la ☯️
marc0la ☯️@maroladry·
@gkdataio Congratulations, man! whats your study method? i mean, in cybersec
English
1
0
0
22
Bing
Bing@bing·
We're curious. What will be your first search once you have access to the new Bing?
English
191
20
390
114.9K