i5nipe

199 posts

i5nipe banner
i5nipe

i5nipe

@i5nipe

Cyber Security Enthusiast | OSCP+ | eMAPT | eCPPTv2

Katılım Aralık 2020
407 Takip Edilen568 Takipçiler
i5nipe retweetledi
смех
смех@0x6D6172636F·
🫠
смех tweet media
QME
24
283
3.1K
107.5K
i5nipe retweetledi
Tur.js
Tur.js@Tur24Tur·
Finally, with @hw16, we managed to bypass the @Cloudflare mTLS protection after around 5 days of work. I'd like to share a few golden tips for bug bounty hunters who might face something similar in the future. But first, here's a quick summary: The target was a banking app with multiple security layers: • Heavy Frida detection mechanisms • Strong root detection • Google SafetyNet/Play Integrity checks • Runtime hooking detection • APK tampering protection (crashed immediately if repackaged/modified) At first, @fridadotre was detected and crashed the app on my device but strangely worked on another device even though both had the same Android version, root method, Frida server version, and architecture. After investigation, we discovered the app had anti-hooking detection that triggered when using aggressive Frida hooks on sensitive KeyStore operations. The Solution: We wrote a minimal Frida script that: 1. Passively monitored certificate operations without modifying behavior 2. Intercepted KeyManagerFactory.init() - the exact moment when mTLS certificates are loaded 3. Extracted the X.509 client certificate and RSA private key (4096-bit) 4. Encoded them using Android's Base64 encoder 5. Formatted as PEM files ready for use Found the mTLS certificate with a unique UUID-based alias in the Android KeyStore. The certificate was being dynamically loaded during the SSL handshake initialization Extracted Files: • client_cert.pem → Client certificate (valid for 2 years) • client_key.pem → RSA private key (PKCS#8 format) We then created a PKCS#12 bundle using OpenSSL to combine the certificate and key into a single file, which could be imported into various tools and browsers for testing or @Burp_Suite Key Takeaway: When facing anti-tampering mechanisms, be surgical hook only what you need, when you need it. Aggressive hooking triggers detection; passive monitoring flies under the radar. This was an awesome challenge and my first time encountering such strong ssl Pinning defenses Attached some image from the mobile api and frida output the certificates #bugbountytips #frida #Magisk #mtls
Tur.js tweet mediaTur.js tweet mediaTur.js tweet media
Tur.js@Tur24Tur

Did @Cloudflare just defeat @Burp_Suite and @CaidoIO? Cloudflare protection is becoming very common. This is the third app I’ve seen using it. Changing the user agent doesn’t help, and Burp TLS-fingerprint bypass plugin didn’t work. The app blocks any request when it detects traffic interception My target mobile app might be using a dynamic certificate based on my friend analysis. Back in Nov 2024, I tested a web app with Burp, but it blocked all traffic. Switching to Caido worked, maybe its signatures weren’t detected at the time. Can anyone share insights? thanks #BugBounty

English
32
162
800
106K
i5nipe retweetledi
SpecterOps
SpecterOps@SpecterOps·
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ ghst.ly/3Lpmjzv
English
2
52
211
46.4K
i5nipe retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
Android TikTok RCE From WebView XSS to native lib overwrite via Zip Slip led to full RCE: 1. Universal XSS 2. JavaScript bridge → open internal deep-link 3. Launch protected activity 4. Split APK 5. Zip Slip → overwrite native lib 6. App restart → RCE @dphoeniixx/practical-android-pentesting-a-case-study-on-tiktok-rce-4a82e79cc7c6" target="_blank" rel="nofollow noopener">medium.com/@dphoeniixx/pr…
Mobile Hacker tweet media
English
0
52
344
22.5K
i5nipe retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
0-click vulnerability affected Android in Dolby's DDPlus decoder-CVE-2025-54957 Malformed audio could lead to memory corruption and crashes. Android decodes audio locally, making this exploitable without user interaction just by receiving crafted RCS voice message by @natashenka
Mobile Hacker tweet media
English
2
20
130
9.8K
i5nipe retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
New Pixnapping Attack: allows any Android app without permissions to leak info displayed by other apps exploiting Android APIs and a hardware side channel (CVE-2025-48561) Pixnapping is not fixed and probably affects all Androids. PoC: Not available yet. Steal 2FA codes 👇
English
6
132
574
54.8K
i5nipe retweetledi
0xdf
0xdf@0xdf_·
TombWatcher from @hackthebox_eu is an assume breach Windows AD box. BloodHound shows a path abusing targeted Kerberoasting, GMSA, password change, and shadow creds. Then there's AD Recycle Bin and ESC15. 0xdf.gitlab.io/2025/10/11/htb…
English
3
26
152
29.6K
i5nipe retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
A new NetExec module: certipy-find🔥 As ADCS is still configured insecurely in many environments, I decided to integrate the certipy find command into NetExec. Now you can quickly find and enumerate vulnerable templates before bringing out the big guns.
Alex Neff tweet media
English
9
137
611
28.6K
i5nipe retweetledi
Karsten Hahn
Karsten Hahn@struppigel·
This blog post about impostor certificates by @SquiblydooBlog is a gem and very relevant right now. Or: How threat actors impersonate companies to obtain authenticode certificates for signing their malware. And why revokation is important. squiblydoo.blog/2024/05/13/imp…
English
0
44
162
13.9K
i5nipe retweetledi
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
28
346
3.2K
111.7K
i5nipe retweetledi
A L I
A L I@Ali_4fg·
I wrote an article about this RCE I discovered via LaTeX injection, a pretty rare case, to be honest. Hope you find it helpful! Here is the blog post, take a look and enjoy :) blog.koalasec.co/from-latex-inj… #BugBounty #bugbountytip #RCE #infosec
A L I tweet media
A L I@Ali_4fg

My RCE report just closed as internal duplicate:( Whitout any excerpt from duplicated report. But, lets see how communication works😭 P.s; i wrote an article and soon i will publish it.

English
3
29
226
12.4K
i5nipe retweetledi
hashcat
hashcat@hashcat·
hashcat v7.1.0 released! This update includes important bug fixes, new features, and support for new hash-modes, including KeePass with Argon2. Read the full write-up here: hashcat.net/forum/thread-1…
hashcat tweet media
English
5
46
157
20.2K
i5nipe retweetledi
sysadafterdark
sysadafterdark@sysadafterdark·
sysadafterdark tweet media
ZXX
198
976
10.9K
461.8K
i5nipe retweetledi
Sean Metcalf
Sean Metcalf@PyroTek3·
I am back to posting to ADSecurity.org in my free time (which I have again). I plan on adding new content relating to Active Directory & Azure AD (now Entra ID). First up is "Entra & Azure Managed Access Revisited". This article expands on one I wrote years ago about how to jump from Azure AD/Entra ID to Azure. This new article covers managing Elevated Access as well as logging. adsecurity.org/?p=4455 Enjoy!
Sean Metcalf tweet media
English
13
110
559
45K
i5nipe retweetledi
SpecterOps
SpecterOps@SpecterOps·
The AD CS security landscape keeps evolving, and so does our tooling. 🛠️ @bytewreck drops info on Certify 2.0, including a suite of new capabilities and refined usability improvements. ghst.ly/45IrBxI
English
0
98
233
13.2K