mongo retweetledi
mongo
1.5K posts

mongo
@mongobug
I like bug bounty programs and breaking things that other people have built. I love kudos.
::1 Katılım Şubat 2015
194 Takip Edilen10.7K Takipçiler

@justdionysus Solved it (a friend sent it to me) and it was pretty fun and different :) ty
English

Well, here's a goofy reverse engineering challenge I started a year or two ago and "polished" up last night (I'm sorry it's JavaScript but that's part of the point):
gist.githubusercontent.com/justdionysus/d…
Please solve it and let me know if it's dumb or boring.
English

@Masonhck3571 I will wait until 7am next time.. but still, any updates?
English

@alxbrsn Alllll the fucking time , even suggested fixes didn’t do anything. Went back to burp 1.7 and don’t have any problems. Check out @CaidoIO , I think it’s going to replace burp in the future :)
zseano@zseano
burp does this to me daily and it's frustrating AF -_-
English

I’m giving away a Burp Suite Pro license!
A Pro license auto renewed and the hacker that I personally sponsored makes enough money from @Hacker0x01 to afford it themselves 🎊
Mention someone that deserves the license in the replies to this tweet and I’ll pick someone in 24h.
English

@PrincessYadhavi @jobertabma @Hacker0x01 You're right but I can't edit :D it should read, 10 crits and 5 lows should not rank lower than just 10 crits
English

@mongobug @jobertabma @Hacker0x01 You are drunk. Go home.
10 crits and 5 lows == 10 crits and 5 lows
English

@Hogarth45_ Well, the algo is wrong then. 10 crits and 1 xss is not worse than 10 crits. That was my point :) appreciate the extra insight
English

@mongobug Gotta keep the impact above 22 if you want an invite to an event.
Why report an xss for $250 and miss out on an event to get $20k+
hackerone.com/community-blog…
English

@njcve_ Hey,
The list of ambassador is here : hackerone.com/hackers/brand-….
Unfortunately, if there is no ambassador for your country, you won't be able to participate :(
English

@Hogarth45_ Agreed, but I'm now hearing of people sitting on RXSS / SXSS / etc too. Admittedly I heard from a small percentage of hunters, but that doesn't seem like a net win for overall security
English

@mongobug I know its very common for people to sit on open-redirects for use with SSRFs at a later date.
I would suspect there is a great number of borderline bugs that get sat on.
But ultimately more bugs are found with h1 than if it didn't exist.
So not perfect, but better than nothing
English

@Hogarth45_ If true, then I wonder how many vulns are going unreported by people who are not willing to get 2 accounts (which is against the rules iirc)
English

@MrTuxracer @plmaltais @Hacker0x01 @Bugcrowd Unfortunately CVSS is hardly objective either, though. And it gets worse because half the bug bounty people and security teams do not fully understand the ratings for each field. Usually becomes a tug-of-war
English

@plmaltais @Hacker0x01 @Bugcrowd I prefer @Bugcrowd’s because I believe that an objective/neutral system reflects your overall achievement/impact better. However, their VRT is the opposite of being objective... so IMO we need their point system paired with CVSS 😏
English

I'm curious to see bug bounty hunters opinion on this one.
@Hacker0x01 and @Bugcrowd are attributing points differently (explanation in thread).
Which one do you prefer?
English

Can someone explain to me why people are losing their minds over this? It’s literally LESS SECURE to use sms two-factor. Doing a big public service here. Everyone should be actively planning to migtate away from sms for security.
Sam E. Antar@SamAntar
Memo to @twitter: Give me a break! Now, you’re trying to monetize account safety? Seriously?
English

@MrTuxracer Top clown.. imagine dealing with this guy as a bug bounty triager or program owner...
English

Interesting to read what he thinks a SQL Injection is... 🤔 (I'm not really surprised)
github.com/mvt-project/mv…
English
mongo retweetledi






