Kunal Pandey

1.4K posts

Kunal Pandey banner
Kunal Pandey

Kunal Pandey

@kunalp94

Love to poke at web, android and desktop Apps. https://t.co/Cd3jlZlNEu || Synack Red Teamer @synack

IN Katılım Ocak 2013
253 Takip Edilen4.5K Takipçiler
zseano
zseano@zseano·
What an AMAZING day :D very emotional, but it was perfect in every way! Wooohooo I now have a wife 🙌🙌
English
70
1
458
17.3K
zseano
zseano@zseano·
Unexpectedly lost my dad early hours this morning… completely out of the blue. He was fit & healthy and now he’s gone 😭 lost for words on how I feel. RIP Dad ❤️❤️ love & miss you forever
zseano tweet media
English
379
0
884
48.8K
Nicolas Krassas
Nicolas Krassas@Dinosn·
Truly honoured to be recognized as Titan at @synack and named Mentor of the Year. It’s a privilege to stand alongside some of the top security professionals in the industry. Thank you all :)
English
14
5
66
6K
sudi
sudi@sudhanshur705·
@kunalp94 Congratulations bro 🎉 ,so you were finally able to meet your Konan 👀
English
1
0
3
301
Kunal Pandey
Kunal Pandey@kunalp94·
🎉 Congratulations 🎉, the winners are @KavanSoni_07 @manish1221singh @pratikcyb @being__aman @scarcemrk @darkrider758 @iammeera_ @pandyaMayur11 @Mitin_sharma_22 @chalcidfly Keep your DM open. I will be contacting you directly. Enjoy the conference.
Kunal Pandey@kunalp94

🎉 Giveaway Alert! 🎉 Hello everyone, I’m giving away 10 students passes for @bsidesahmedabad. Just comment below why you wanna attend the event and like the tweet. Good luck.

English
9
6
27
4.6K
Kunal Pandey
Kunal Pandey@kunalp94·
🎉 Giveaway Alert! 🎉 Hello everyone, I’m giving away 10 students passes for @bsidesahmedabad. Just comment below why you wanna attend the event and like the tweet. Good luck.
English
62
26
86
9.1K
Kunal Pandey
Kunal Pandey@kunalp94·
@0xMstar @krishnsec @zseano @Tur24Tur You can try encoded html entity in between jav%26Tab%3bscript://google.com/%0dalert(1) (	 —> %26Tab%3b) Only if the above value is reflecting on href link. or try %0c in between the javascript protocol.
English
1
0
7
1.2K
MorningStar
MorningStar@0xMstar·
Got this on one of the BB program , do you see problem here?, I reported this on bugcrowd Hackercup 2 years back & in collaboration with @krishnsec @zseano @Tur24Tur , It was in resolved state for 1 year, Recently revisited this & reported.
MorningStar tweet media
English
8
3
54
14.1K
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
I am incredibly happy to have skipped Defcon and Blackhat to marry the love of my life ❤️ Thanks to @smiegles @lucio_89 and Melvin for travelling all the way to Germany to spend the day with us ❤️
Patrik Grobshäuser tweet mediaPatrik Grobshäuser tweet media
English
48
0
228
10.1K
Kunal Pandey
Kunal Pandey@kunalp94·
@carbonmanx @zseano The element "style" will trigger the above event handler as the content-visibility has been as auto. Using double quotes and adding "style element will trigger above XSS.
English
0
0
1
55
Kunal Pandey
Kunal Pandey@kunalp94·
Happy New Year Everyone! May each of you achieve your personal goals and enjoy both mental and physical well-being in the coming year.
English
0
0
5
1.2K
sudi
sudi@sudhanshur705·
@kunalp94 Thankyou,that WireServer thing looks interesting but I have been strictly told to focus on escalating the impact via the Oauth token only 🥲(the bug is actually fixed still they reverted the changes on the dev env just so that I can have a chance escalating it with that condition
English
1
0
2
203
sudi
sudi@sudhanshur705·
I need to prove impact for the oauth token recieved from Azure Metadata endpoint(from a ssrf),are there any sensitive endpoints which are worth trying basically the program wants me to prove what the worst thing could be done with the retrieved access_token.Does anyone have idea?
English
3
1
11
2K
Brandon Rossi
Brandon Rossi@0xConda·
After a few months of searching, I'm finally closing on my first house this week! Hoping to resume cybersecurity hobbies once we're settled. There are bugs to be found!
English
5
1
39
5.1K
Justin Gardner
Justin Gardner@Rhynorater·
Ways to leak oauth code in app: * Bad redir URL host (can redirect to badexample[.]com not just example[.]com) * Bad redir URL host via . regex issue (can redirect to wwwXexample[.]com instead of www[.]example[.]com) * Bad redir URL path (redir to a path the attacker can leak via application logic) * Parameter injection in redir URL %3f -> ? adding parameters or breaking restriction logic * HTML Injection + permissive redir URL path (img tag + meta tag referrer policy) * PostMessage leak of URL * Open redirect Got any others?
English
5
48
205
27.2K
Kunal Pandey
Kunal Pandey@kunalp94·
If you see a site with " _layout/*" endpoints or in source code, then it runs on Microsoft SharePoint. Here is the API endpoint list that you can still test: s-kainet.github.io/sp-rest-explor… It's a complete list but you can still check out Microsoft sharepoint documentation.
English
1
23
96
11K