l0cpd

897 posts

l0cpd banner
l0cpd

l0cpd

@l0cpd

| Father | Bug Bounty Hunter | RECON | MMA |

Katılım Eylül 2018
1.1K Takip Edilen1.7K Takipçiler
l0cpd retweetledi
TrendAI Zero Day Initiative
Mind blown alert 🤯! Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG (@starlabs_sg) used a Memory Corruption bug to exploit VMware ESXi with the Cross-tenant Code Execution add-on, earning a sweeeeeet $200,000 and 20 Master of Pwn points. Full win let's go! #Pwn2Own #P2OBerlin
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
5
60
544
45.9K
H4x0r.DZ 🇰🇵
H4x0r.DZ 🇰🇵@h4x0r_dz·
I’m going to buy this large piece of land for $100,000, build my farm, and make my dream come true. living with chickens, cows, and sheep.
English
21
5
229
7.1K
l0cpd retweetledi
bugcrowd
bugcrowd@Bugcrowd·
What it actually takes to make a million in bug bounty 💸⬇ For HX007, it was... obsession, curiosity, P1-level persistence, and coming back to admin panels month after month until something finally cracked open. If you’re grinding, stuck, or chasing your first big win, his story is the perfect proof. The Crowd has no ceiling, only momentum. Learn how to rewrite your life through hacking: bugcrowd.com/blog/how-i-hac…
bugcrowd tweet media
English
5
40
274
16.3K
l0cpd
l0cpd@l0cpd·
Read and analyze javascript files carefully.
l0cpd tweet media
English
6
10
242
10.3K
l0cpd retweetledi
bugcrowd
bugcrowd@Bugcrowd·
A lot of hackers fail because they only look for bugs, not systems. If you want to find vulnerabilities others miss, you need to model how the application works first. Here are 5 ways to do it right 👇 1️⃣ Identify valuable target data Start by asking: what data does the company care most about? These “treasure chests” guide your testing and threat modeling. 2️⃣ Map infrastructure layers Break down the app into front end, middleware, and back end. Identify JavaScript frameworks (like Next.js), authentication middlewares, and where logic lives. Use browser tools and proxies to piece together the stack. 3️⃣ Assess full request flow Don’t test endpoints blindly. Observe login flows, redirects, cookie behavior, token lifecycles, and any session creation process. Modeling how each action flows through the stack gives you exploit ideas. 4️⃣ Observe middleware behavior Look for things like content caching, virtual host routing, API gateways, and load balancers. These layers are often misconfigured, especially when passing requests across internal services. 5️⃣ Apply context to logic Features are rarely dangerous alone. Look at how two normal flows might interact e.g. guest checkout + account creation. That’s where logic flaws live. Combine this with known tech stack quirks to predict bugs.
bugcrowd tweet media
English
0
22
91
6.4K
l0cpd
l0cpd@l0cpd·
“Full-Blown SSRF to Gain Access to Millions of Users’ Records and Multiple Internal Panels” by Skyer @skycer_00/full-blown-ssrf-to-gain-access-to-millions-of-users-records-and-multiple-internal-panels-3719d9b802e9" target="_blank" rel="nofollow noopener">medium.com/@skycer_00/ful…
l0cpd tweet media
English
0
0
11
568
l0cpd retweetledi
Coffin
Coffin@lostsec_·
I've included all the proven 403 bypass techniques that consistently work in real-world scenarios. After reading this write-up you won't need to refer to any other article or video on the topic anymore..i will update more things in it soon.. osintteam.blog/the-ultimate-g…
English
17
155
665
38.6K
l0cpd retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoonsec·
Writing a technical book is only a small fraction of the work. You still need: 1. Technical review 2. General editing 3. Copy editing 4. Cover designing 5. Proof reading <— I am here “From Day Zero to Zero Day” is a way better book thanks to the amazing team at @nostarch and I can’t wait till it’s in your hands. nostarch.com/zero-day
spaceraccoon | Eugene Lim tweet media
English
15
116
891
41.2K
l0cpd
l0cpd@l0cpd·
“A Journey of Limited Path Traversal To RCE With $40,000 Bounty!” by HX007 @HX007/a-journey-of-limited-path-traversal-to-rce-with-40-000-bounty-fc63c89576ea" target="_blank" rel="nofollow noopener">medium.com/@HX007/a-journ…
l0cpd tweet media
English
0
0
2
281