munsiwoo

21 posts

munsiwoo

munsiwoo

@munsiwoo

web bug bounties / security researcher at @samsungsds

Seoul, Korea Katılım Ağustos 2019
272 Takip Edilen206 Takipçiler
munsiwoo retweetledi
PT SWARM
PT SWARM@ptswarm·
🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: swarm.ptsecurity.com/impossible-xxe…
PT SWARM tweet media
English
0
112
324
24K
munsiwoo retweetledi
jp / kw0
jp / kw0@JoshuaProvoste·
0-click RCE Exploit for CVE-2024-10924 that affects 4 million WP sites 🤪 Secure your site ASAP! #WordPress #BugBounty #BugBountyTips
jp / kw0 tweet mediajp / kw0 tweet media
English
9
114
755
68.7K
munsiwoo
munsiwoo@munsiwoo·
@_lauritz_ there's another interesting trick here 😇 ```html <script> let a = '<!--<script>'; alert(a); // not work </script> <script> alert(2); // not work </script> ``` this behavior is also valid for backtick and double quote.
English
3
1
14
664
Lauritz
Lauritz@_lauritz_·
TIL: HTML comments work as single-line-comments in JavaScript context 🤯 <script> <!-- test --> alert(1); alert(2); </script> Only alert(2) is executed. #HTML #LegacyStuff #XSS
Lauritz tweet media
English
1
18
146
8.6K
munsiwoo retweetledi
PlaidCTF
PlaidCTF@PlaidCTF·
PlaidCTF is officially over!! Congratulations to our top-performing investigation teams! 1. "What's your ETA" (HypeBoy) 2. "Kalmar: Guardians of the Elven Veil - Paranormal Psyduck's Payback" (Kalmarunionen) 3. "Spooky Maltese Ghosts" (Friendly Maltese Citizens)
English
1
12
32
7K
munsiwoo retweetledi
php.net
php.net@official_php·
Statement on glibc/iconv Vulnerability Recently, a bug in glibc version 2.39 and older (CVE-2024-2961) was uncovered where a buffer overflow in character set conversions to the ISO-2022-CN-EXT character set affects PHP. Read our full statement at #2024-04-24-1" target="_blank" rel="nofollow noopener">php.net/archive/2024.p…
English
1
68
190
37.2K
munsiwoo retweetledi
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Web Security vs. Binary Exploitation
English
99
1.9K
10.2K
833.1K
munsiwoo
munsiwoo@munsiwoo·
Blind PostgreSQL Injection in DApp Interface (USD $20,000 Bounty) I'll be back soon with an English version post. Hang in there 😎 blog.munsiwoo.kr/2023/03/blind-…
munsiwoo tweet media
English
3
36
176
10.3K
munsiwoo
munsiwoo@munsiwoo·
Sometimes the bot may not work :( If you solve the challenge, please DM me with your payload.
English
0
0
1
590
munsiwoo
munsiwoo@munsiwoo·
I made a simple xss challenge :) link: munsiwoo.kr:7777 can you execute script you want, and steal the flag?
English
2
2
15
3.2K
Youngjoo (Jay) Lee
Youngjoo (Jay) Lee@ashuu_lee·
Today I got second bounty from VRP :) It was UAF vulnerability in stable chrome.
Youngjoo (Jay) Lee tweet media
English
4
1
83
0
munsiwoo retweetledi
Soroush Dalili
Soroush Dalili@irsdl·
From now until Christmas, I will try to share something from my notes / research every day - most of them are old but might still be useful to remember #XMas2020 #AppSec #Web #HTTP
English
9
117
512
0
munsiwoo
munsiwoo@munsiwoo·
@po6ix 형은 좀 쉴 필요가 있다
한국어
1
0
2
0
munsiwoo retweetledi
𝚑𝚐𝟾
𝚑𝚐𝟾@_hg8_·
Incredible research: $75,000 bounty🤯 "My research uncovered 7 0day vulnerabilities in Safari (CVE-2020-3852, CVE-2020-3864, CVE-2020-3865, CVE-2020-3885, CVE-2020-3887, CVE-2020-9784, & CVE-2020-9787), 3 were used in kill chain to access the camera." ryanpickren.com/webcam-hacking…
GIF
English
43
699
2.3K
0
munsiwoo retweetledi
Eduardo Vela
Eduardo Vela@sirdarckcat·
Ever wondered what makes a CTF challenge good? I've asked myself that many times. I wrote this to help me answer that question based on discussions with others in the community bit.ly/ctf-design
English
8
207
535
0