UdDin

144 posts

UdDin banner
UdDin

UdDin

@uddin070

I am a Cyber Security Enthusiast and very much passionate about this subject.

Bangladesh. Katılım Ağustos 2015
189 Takip Edilen20 Takipçiler
UdDin
UdDin@uddin070·
@GodfatherOrwa Great advice! Now a days distraction every where.
English
0
0
1
104
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
As advise for all of you bro’s, don’t buy any shit Create your own AI setup ❤️
English
6
1
69
2.9K
Godfather Orwa 🇯🇴
Godfather Orwa 🇯🇴@GodfatherOrwa·
* Create your own AI scanner * Create website for that AI * Offer it for Sale/Subscription * create a X profile for the AI * Start Posting Old bounty’s photos with posts like (found this by this @AI, I spend 10$ and I got rewarded 10K$) Story Of This Days 😤 Not #bugbouny 🫣
English
28
43
429
13.7K
UdDin
UdDin@uddin070·
@lostsec_ That's Point. But bro i practice some lab after few months i forgot them, the i have to resolve again.
English
2
0
7
1.3K
Coffin
Coffin@lostsec_·
Hi everyOne, sorry for being inactive lately. I was dealing with some health issues over the past few weeks, but I’m happy to say that I’m completely fine now and back to working again. Right now, I’m working on the next 2-3 videos, and I also want to give an update regarding the Dependency video. It might take a bit longer than expected because I genuinely want it to be one of the best videos ever uploaded on this channel. I don’t want to rush it just for the sake of uploading. I’m putting a massive amount of time, research, and effort into it, so I appreciate your patience. Also, for older membership users, you can cancel your upcoming month’s subscription for now so your money doesn’t get wasted during the delay. Once the Dependency conclusion video is released, you can renew it again. And trust me, I’m 200% sure it’ll be worth every single penny. Till then, I’ll continue uploading some public videos for everyone. Thank you for all the support and patience ❤️
Coffin tweet media
English
12
7
189
5.5K
Medusa
Medusa@medusa_0xf·
Do you test for cookie tossing?
English
9
0
31
3K
UdDin
UdDin@uddin070·
@weezerOSINT Please write about the process for us bro.
English
0
0
0
196
impulsive
impulsive@weezerOSINT·
JWT Signing Brute to full platform takeover
impulsive tweet media
English
12
8
266
18.9K
UdDin
UdDin@uddin070·
@Cyberhijabitech Right, then they repeat it infront of neighbours or relatives.
English
0
0
2
83
Maryam Shuaibu Aliyu
Maryam Shuaibu Aliyu@Cyberhijabitech·
If you're married or about to marry, this is for you, Try as much as possible not to 🧵
English
3
9
40
3.3K
UdDin
UdDin@uddin070·
@Bugcrowd join bugcrowd team, it will be great!!
English
0
0
0
7
bugcrowd
bugcrowd@Bugcrowd·
A long time ago, in a shell far, far away… 🌌 A red teamer decided it was time to prove they were ready. CrowdForce is Bugcrowd’s elite red team, and we’re looking for hackers with the skills to execute the greatest attack simulations, adapt under pressure, and collaborate with some of the smartest minds in offensive security. Think you’re ready? 🦸 May the force be with you. Learn how to join CrowdForce: bugcrowd.com/blog/how-to-jo…
English
1
2
24
1.8K
UdDin
UdDin@uddin070·
@4osp3l Oh no! Bro, I find the same vulnerability on a bugbounty platfrom.
English
0
0
0
16
Gospel
Gospel@4osp3l·
F**k! I didn't look at the scope... they marked it as *OOS* "Password and account recovery policies, such as reset link expiration," but it does lead to ATO, still. I don't know why they added such in *OOS* You can definitely look out for it on your target ( might get accepted if not listed in *OOS* ) Tip - 1. Create a test account ( test@gmail.com ) 2. Logout, then do a *password reset* on *test@gmail.com* 3. Once you get the reset link, take note of it ( do not use it yet ) 4. Login back to *test@gmail.com* 5. Change email from *test@gmail.com* to *another@gmail.com* ( make sure email change is verified / successful ) 6. Logout from *another@gmail.com* 7. Attempt login to *test@gmail.com* ( results to "Invalid login", due to the email doesn't exist in the system, anymore ) 8. Now, go back to the *reset link* sent to *test@gmail.com* 9. Try to use it to set a new password. If successful, the account with the email *another@gmail.com*, password, will be changed. The old email address, although no longer valid for authentication, still retained account recovery capability. A realistic scenario - 1. An attacker gains temporary access to the victim's old email inbox or obtains a reset link. 2. The attacker requests a password reset and keeps the link. 3. The victim later updates their account email to a new address, believing the account is secured. 4. The attacker uses the old reset link to reset the password and regain full access.
Gospel@4osp3l

This vulnerability is an interesting one ( it leads to ATO )! I sent the report a few days ago. Once the report gets accepted, I'll share some tips. You might probably spot the same misconfiguration on your target! I've no idea of the severity ( could be an easy P2/P3 ).

English
12
9
81
7.1K
Andrew Tate
Andrew Tate@Cobratate·
5000 retweets I grow my hair back.
Andrew Tate tweet media
English
1.7K
4.9K
15K
891.7K
bugcrowd
bugcrowd@Bugcrowd·
Let’s test your 💎 Rails knowledge @user.update(params.require(:user).permit(:name, :bio, :is_admin)) What’s the bug? A) Insecure Direct Object Reference   B) Mass assignment leading to privilege escalation   C) Server Side Request Forgery   D) Cross Site Request Forgery Bonus: Which parameter should never be user-controlled here? 😈
English
8
0
29
4.5K
Intigriti
Intigriti@intigriti·
We just dove into our shelf of archived bug bounty write-ups from the most notable hackers! 🤠 In this issue, we selected 5 compelling articles (that are still relevant today) to share with you, from which you can learn something new! 😎 🧵 👇
Intigriti tweet media
English
3
16
76
5.2K
Coffin
Coffin@lostsec_·
things are getting more serious. [github dorking + manual hunting + burp extensions + private tools + a custom panel to use discovered API keys like gemini chat interface… just enter a target domain or a list of subdomains and the tool handles the rest. it scrapes API keys from page source and JS files at full high speed, then lets you verify them for vulnerable to issues like file disclosure, upload, delete and more. this is just a small demo. full video coming soon with much more things combined. you have no idea how much impact a single leaked API key can have at scale. stay tuned.
Coffin tweet mediaCoffin tweet media
English
15
47
526
24K
UdDin
UdDin@uddin070·
@Behi_Sec Please tell us, which tools suitable for hunting!
English
0
0
1
496
Behi
Behi@Behi_Sec·
What AI tools are you currently using in your bug hunting workflow?
English
11
1
49
9.1K
UdDin
UdDin@uddin070·
@Behi_Sec Subfinder Assetfinder Crt.sh Amass Virustotal github Findomain burpsuit scope Chaos Alterx puredns
Deutsch
0
0
1
66
Behi
Behi@Behi_Sec·
These are the tools I use for subdomain recon: - findomain - tldfinder - assetfinder - amass - alterx What do you use?
English
4
3
53
2K