zayooko

25 posts

zayooko

zayooko

@zayooko

Katılım Aralık 2016
47 Takip Edilen37 Takipçiler
zayooko retweetledi
Dennis
Dennis@DennisF·
"I'm the cybersecurity director at NSA and you could absolutely craft a phishing message that would get me to click a link. You’ve got to design your architecture to assume the humans are humans and bad things will happen." @RGB_Lights AMEN
English
7
225
762
143.3K
zayooko retweetledi
Intigriti
Intigriti@intigriti·
5 CSRF exploitation techniques 🧵👇
Intigriti tweet media
Français
9
87
249
45K
zayooko retweetledi
张惠倩
张惠倩@momika233·
Needle (CVE-2023-0179) exploit This repository contains the exploit for my recently discovered vulnerability in the nftables subsystem that was assigned CVE-2023-0179 github.com/H4K6/CVE-2023-…
English
5
68
198
25.5K
zayooko retweetledi
Haifei Li
Haifei Li@HaifeiLi·
🚨This unauthorized RCE bug (CVE-2023-21554) in the "forgotten" MSMQ service may have big impact. If you’re a Windows admin, you need to check your environments ASAP (you may have unawarely enabled the service). twitter.com/_CPResearch_/s…
Check Point Research@_CPResearch_

🚨 We discovered 3 vulnerabilities in Microsoft Message Queuing (MSMQ) service, including #QueueJumper (CVE-2023-21554), a Critical vulnerability that could allow unauthorized attackers to remotely execute code. More details in our blog 👉 research.checkpoint.com/2023/queuejump… #PatchNow

English
5
64
153
75.3K
zayooko retweetledi
Geekboy
Geekboy@emgeekboy·
OpenAI (LLM) Integration is coming to @pdnuclei using DSL that can be used in the template input/output context. Here is a basic example of analyzing the response header, but it could be anything! unknown patterns/secrets; it's a matter of how creative you can be with your query to explore the power of LLM. Used prompt with DSL extractor in the shared template - llm_prompt("what tech this server is using? return idk if you dont know" + header) Let me know what you think or have any other interesting use cases or ideas to utilize LLM / prompts for security? #hackwithautomation #openai #LLM
Geekboy tweet media
English
3
55
315
54K
zayooko retweetledi
Nuclei by ProjectDiscovery
If you've ever had to deal with angry family members because you accidentally got blocked by a WAF then listen up! 🚨 ⚠️ Detect if a url is behind a WAF before testing it with the WAF-detect template! Find it here 👉 github.com/projectdiscove…
GIF
English
4
24
106
13.3K
zayooko retweetledi
Dormidera
Dormidera@Dormidera·
El grupo Ransom House responde y confirma el ataque #DDoS realizado por los Mossos. Amenaza con publicar mas datos en breve sobre pacientes con enfermedades infecciosas. Via @_bettercyber_
Dormidera tweet media
Español
5
17
36
24.1K
zayooko retweetledi
OpenZeppelin
OpenZeppelin@OpenZeppelin·
The final results of the Blockchain Hacking Techniques of 2022 are in! After a year of increased participation, as well as novel attack vectors leading to over $3.7B in losses, this initiative aims to provide critical insights into the ongoing challenges facing blockchain security. Ultimately, the collective efforts of the community can help to ensure the safety and stability of Web3 projects in the future. Read the final results below 👇 blog.openzeppelin.com/final-results-…
English
13
124
240
33.2K
zayooko retweetledi
Intigriti
Intigriti@intigriti·
What resource has helped you the most in learning bug bounties?
English
20
10
69
26.4K
zayooko retweetledi
Intigriti
Intigriti@intigriti·
Sometimes when developers configure CORS origin whitelists, they accidentally allow connections from unwanted origins and potentially facilitate data transfer to malicious origins! Let's look at the most common mistakes developers make when setting up CORS policies 👇
Intigriti tweet media
English
3
44
193
35.5K
zayooko retweetledi
DragonJAR - Seguridad Informática
Nueva Vulnerabilidad en Azure Active Directory 😱: Ataque BingBang 💥 Compromete Bing y Datos Personales de Usuarios 👥 Wiz Research 🔍 @wiz_io han descubierto un nuevo vector de ataque en Azure Active Directory 😰 que deja expuestas aplicaciones mal configuradas a accesos no autorizados 🚫. Esta vulnerabilidad afecta aproximadamente al 25% de las aplicaciones multi-tenant 📊. Entre las aplicaciones vulnerables de Microsoft, se encuentra un sistema de gestión de contenidos (CMS) que controla Bing.com 🌐, lo que permite modificar resultados de búsqueda 🔍 y lanzar ataques XSS 💣 de alto impacto en los usuarios de Bing, poniendo en riesgo datos personales como correos electrónicos de Outlook 📧 y documentos de SharePoint 🧵👇
DragonJAR - Seguridad Informática tweet media
Español
3
91
250
43.2K
zayooko retweetledi
Hisxo
Hisxo@adrien_jeanneau·
👋 I just released "JSpector" : a simple Burp Suite extension to passively crawl JS files and display the results (URLs & endpoints) in the "Issues" tab of each target. I needed something simple to do this, and now that it's done, I'm sharing i!🤗 ➡ You can download it here: github.com/hisxo/JSpector #BugBounty
Hisxo tweet mediaHisxo tweet mediaHisxo tweet media
English
18
223
748
94.8K