Huy Ngoc

1.5K posts

Huy Ngoc

Huy Ngoc

@ngocdh

Pentester

Paris Katılım Kasım 2011
202 Takip Edilen1.1K Takipçiler
Huy Ngoc retweetledi
Critical Thinking - Bug Bounty Podcast
If the target sets X-Frame-Options: DENY, you can’t iframe it to abuse session context. But @slonser_ points out a slick workaround: use the fetchLater() API to schedule deferred requests that execute even after the page is closed or navigated away from.
Critical Thinking - Bug Bounty Podcast tweet media
English
13
59
351
29.9K
Huy Ngoc retweetledi
Lupin
Lupin@0xLupin·
The article is out ! 🤟 Title: We hacked Google’s A.I Gemini and leaked its source code (at least some part) We worked on this with @Rhynorater and I'm so excited this is finally out ;) Link in the thread 🧵
Lupin tweet media
English
1
88
325
26.5K
Huy Ngoc retweetledi
frycos
frycos@frycos·
My blog post about several findings in Dynamics 365 Business Central. I tried writing in a .NET primer style for code audit beginners. frycos.github.io/vulns4free/202…
English
5
60
172
25K
Huy Ngoc retweetledi
HackerOne
HackerOne@Hacker0x01·
The first batch of #H165 winners are here! On behalf of the HackerOne and @salesforce teams, thank you for your hard work. 💪 1st Place: arneswinner 3rd Place: ngocdh Eliminator: matanber Exterminators: shubs, ziot, nahamsec, ryotak Most Valuable Hacker: arneswinner
HackerOne tweet mediaHackerOne tweet mediaHackerOne tweet mediaHackerOne tweet media
English
4
12
147
28.3K
Huy Ngoc retweetledi
shubs
shubs@infosec_au·
I can't believe so many people are sleeping on this research: code-white.com/blog/leaking-o… Code White again smashes it out of the park with their meticulous knowledge of software stacks. I have so much respect for them publishing this. Nice work, @mwulftange!
English
5
85
369
29.3K
Huy Ngoc retweetledi
HTTPVoid
HTTPVoid@httpvoid0x2f·
Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k! blog.projectdiscovery.io/hello-lucee-le…
English
7
109
352
44.4K
Huy Ngoc retweetledi
Assetnote
Assetnote@assetnote·
Early this morning, we alerted our customers to a new Ivanti SSRF vulnerability that our research team discovered when reverse engineering Ivanti’s latest patch. We decided to hold off on releasing this blog post publicly and support our customers in their remediation. Since this finding has been publicly posted by another party, we are also releasing our research to help add some more color. assetnote.io/resources/rese…
Assetnote tweet media
English
1
45
146
23.6K
Huy Ngoc retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Exploiting ASP .NET TemplateParser to get RCE in Sitecore (CVE-2023-35813) and SharePoint (CVE-2023-33160) by @mwulftange in two parts: part 1 at code-white.com/blog/exploitin… is live now and part 2 will follow in a few days...stay tuned!
English
0
104
252
60.3K
Huy Ngoc retweetledi
Corben Leo
Corben Leo@hacker_·
I've made $500k+ from SSRF vulnerabilities. Here are my tricks:
Corben Leo tweet media
English
83
1.2K
4.4K
439.9K
Huy Ngoc retweetledi
Hussein Daher
Hussein Daher@HusseiN98D·
Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf
Hussein Daher tweet mediaHussein Daher tweet media
English
55
523
1.9K
184.1K
Huy Ngoc retweetledi
Karsten Hahn
Karsten Hahn@struppigel·
RE Tip. If you want to decrypt obfuscated .NET strings, just call them from Powershell. E.g. this is xWorm config decryption. File: virustotal.com/gui/file/cb0a5…
Karsten Hahn tweet media
English
6
137
544
59K
Huy Ngoc retweetledi
Soroush Dalili
Soroush Dalili@irsdl·
4/ 🔥 Did you know `<!ENTITY x SYSTEM "//domain/">` in Java triggers a FTP request, not HTTP ? The WAF didn't. I leveraged this oversight for successful data exfiltration.
English
1
5
55
4.4K