n3mo

21 posts

n3mo

n3mo

@n3mohb

Katılım Kasım 2019
650 Takip Edilen86 Takipçiler
n3mo retweetledi
TrendAI Zero Day Initiative
Collision – The VNG Security Response Center was able to execute a 2-bug chain against the QNAP TS-464. However, the exploit they used was previously known. They still earn $5,000 and 1 Master of Pwn point. #Pwn2Own
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
9
38
13.8K
n3mo retweetledi
VNG Security Response Center
VNG Security Response Center@vngsecresponse·
We're really happy to share our improvements and some experiments for the CookieMonster tool. Weaponizing Monster for Cookies Attacks: vsrc.vng.com.vn/blog/weaponizi… Also include burp-extender plugin for burp suite. Hope you guys enjoy it. ~Cheers, VSRC
VNG Security Response Center tweet media
English
0
13
29
0
n3mo retweetledi
VNG Security Response Center
VNG Security Response Center@vngsecresponse·
Ladies and Gentlemen: The new Dojo opens to welcome black belt Hackers to fight for honor!!! #VSRC Liferay revisited: A tale of 20k$. vsrc.vng.com.vn/blog/liferay-r… Hope you guys enjoy it and stay tuned for more technique writeups / blogs / exploits ... will come. ~Cheers, VSRC
VNG Security Response Center tweet media
English
3
114
426
0
n3mo retweetledi
shubs
shubs@infosec_au·
1/10 - I've been doing offensive security source code review for a long time now, and along the way I've learnt a lot of lessons that can make you more effective. Some of them include:
English
30
387
1.3K
0
n3mo retweetledi
shubs
shubs@infosec_au·
I've released the first episode of Bug Bounty Redacted today (Exposed Redis & HAProxy): youtube.com/watch?v=mWNaGn… This series walks you through real bug bounty reports that were rewarded, and explains the discovery process, and reporting process in detail. New episodes Monthly!
YouTube video
YouTube
English
10
157
533
0
n3mo retweetledi
Polaris
Polaris@polarisinfosec·
Polaris rolled out protection for our customers using our Web Application & API Protection against log4j2 vulnerability (CVE-2021-44228). We have refined the rules to block more advanced WAF bypass payloads. polarisec.com
English
0
1
7
0
n3mo
n3mo@n3mohb·
@arkark_ can i get this blog?
English
1
0
0
0
Ark
Ark@arkark_·
ぐわー、なんで String.SafetifyRegExp を汚染する方を思いつかなかったんだ。シンプルな問題で好き
Ark tweet media
日本語
1
0
5
0
n3mo retweetledi
Thanh Nguyen
Thanh Nguyen@redragonvn·
Our Pre-Auth RCE exploit for Atlassian Confluence (CVE-2021–26084) was leaked after reporting it to @VMware. They have refused to admit the leak and ignored our emails. tradahacking.vn/atlassian-conf…
English
25
388
955
0
n3mo retweetledi
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
using z3 to reverse a custom hash during a CTF be like
English
11
57
752
0
n3mo retweetledi
Cyber Advising
Cyber Advising@cyber_advising·
👺XSTREAM<=1.4.17: -CVE-2021-39141(RCE) - CVE-2021-39144(RCE) - CVE-2021-39150(SSRF) - CVE-2021-39152(SSRF). PoC github.com/zwjjustdoit/Xs…
Cyber Advising tweet media
0
45
126
0
n3mo retweetledi
Forrest Brazeal
Forrest Brazeal@forrestbrazeal·
Finally, a use for math! "The Ransomware Song"
English
98
1.5K
3.8K
0
n3mo retweetledi
Patrik Grobshäuser
Patrik Grobshäuser@ITSecurityguard·
I found two more!!! #XSs #payloads 1. stop:alert() 2. posting:alert() 3. nonesense:alert() 4. bugbountytips:alert() 5. please:alert() 6. thank:alert() 7. you:alert() 8. bro:alert() #bugbountytips
English
20
50
227
0
n3mo retweetledi
dinosaur
dinosaur@dinosaurcouch·
dinosaur tweet mediadinosaur tweet media
ZXX
82
12.4K
62.4K
0