xerxes

16 posts

xerxes

xerxes

@rip_xerxes

noob hacker full time student 日本語勉強している

Katılım Mart 2025
95 Takip Edilen120 Takipçiler
p0psec
p0psec@p0psec·
After DefCon, I started bug bounty hunting, made $5,200 on @Bugcrowd and completed an @intigriti CTF. Looking back, I’m proud of what I accomplished in 2025. I’m taking 2 weeks off. See you all next year! 🥳
English
5
2
134
5.2K
xerxes
xerxes@rip_xerxes·
just spent ~11 hours making and fixing a poc for this stupid cors bug. never testing cors ever again after this lol
English
1
1
8
514
xerxes
xerxes@rip_xerxes·
always take into consideration the context of the application youre targeting and think of attack scenarios that their users would actually be concerned about. this can turn what would normally be a non-issue into a valid bug!
xerxes tweet media
English
1
0
66
2.2K
xerxes
xerxes@rip_xerxes·
and I forgot to mention that it reports with no severity, which worries me even more. safe to say im never using this again. ended up spending more time writing the report than I normally would
English
0
0
0
111
xerxes
xerxes@rip_xerxes·
tried using h1's report assistant and I made the worst report I have ever submitted. The title looks like there is no impact and I didn't notice it was changed before I reported. I wrote the report to game the ai to what I want rather than to detail the bug accurately and failed
English
1
0
1
132
xerxes
xerxes@rip_xerxes·
css injection is EVERYWHERE.
English
0
0
1
93
xerxes
xerxes@rip_xerxes·
waking up at 3-4 am has led to me putting so much more time into bug bounty than i would otherwise.
English
0
0
3
116
xerxes
xerxes@rip_xerxes·
@efaav Huge issue!!!1
xerxes tweet media
English
0
0
1
70
Faav
Faav@efaav·
Part II: I found a bypass to Microsoft's fix using a Timing Attack to leak the Microsoft Event Registration database again! Here's the writeup: blog.faav.top/microsoft-even… #BugBounty #bugbountytips
Faav@efaav

I found another vulnerability to leak the Microsoft Events Registration and Waitlist databases, this could've leaked tons of PII. Here's the writeup: blog.faav.top/microsoft-even… #BugBounty #bugbountytips After this, I found a bypass to Microsoft’s fix and will be releasing Part II in a few days.

English
4
23
82
8.8K
xerxes retweetledi
Sam Curry
Sam Curry@samwcyo·
Earlier this year, @infosec_au and I discovered multiple vulnerabilities that allowed us to access the back office admin panel of ClubWPT Gold (the World Poker Tour's website) where we could manage customer data, KYC, and more. Read the writeup here: samcurry.net/hacking-clubwp…
English
21
94
386
34K
xerxes retweetledi
Nagli
Nagli@galnagli·
We accidentally got access to every Academy Award nominee's home address and phone number. Before last year's Oscars Ceremony, together with @iangcarroll and @samwcyo, we found a way to leak every nominee's PII, including phone numbers and home addresses of the biggest actors around the world - from @ladygaga to @JaredLeto. We were interested in the security of award ceremony shows, especially with the rise of @Kalshi and @Polymarket betting on winners. We wanted to check if it would be possible for an attacker to leak the winner before the official announcement. While we didn't find evidence of that, we did notice that two of the Academy Awards' primary services had their APIs publicly facing without any authentication. One offered general information about the ceremony, and the other allowed nominees to sign up and vote. The first one - globalservices.oscars.org/Payments/GetHi… - allowed us to fetch every transaction made to sign up as a nominee for the Academy Awards, including member IDs and last four digits of credit cards. With one request, we could get hundreds of contact IDs which could be chained with another API to correlate them to actual Hollywood actors via submissionsapi.oscars.org/api/Report/Get…{ID} Randomly skimming through the results, we saw they leaked full names, home addresses, phone numbers, email addresses of famous Hollywood stars. We responsibly disclosed the findings to the Academy Awards on January 14th, which were promptly fixed.
Nagli tweet mediaNagli tweet mediaNagli tweet mediaNagli tweet media
English
10
76
493
56.2K
narak
narak@0xujasis·
@rip_xerxes What's your method to read it? Any tools?
English
1
0
1
109
xerxes
xerxes@rip_xerxes·
always read the javascript. you will never expect the miracles you find.
xerxes tweet media
English
14
5
219
9.2K
xerxes
xerxes@rip_xerxes·
ive been struggling to find a target to actually put time into. i keep starting and switching programs all the time.
English
5
0
37
4.1K