🕵️ MLT 🧙‍♂️

1.2K posts

🕵️ MLT 🧙‍♂️ banner
🕵️ MLT 🧙‍♂️

🕵️ MLT 🧙‍♂️

@0dayWizard

Cybersec researcher & exploit developer w/ emphasis on webapp security. Former #TeaMp0isoN + former Founder of Project Insecurity LTD + founder of Bug0xF4.

keybase.io/0dayWizard เข้าร่วม Temmuz 2021
185 กำลังติดตาม4.6K ผู้ติดตาม
ทวีตที่ปักหมุด
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
I'm rarely able to access twitter these days, so if anyone needs me for any reason then then I can be contacted via matrix, telegram, or Keybase. Matrix: worldwickedweb@matrix.org Telegram: Libuuid2 Keybase: keybase.io/0dayWizard
English
1
0
7
2.2K
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
Been writing a script to make post-exploitation on *nix easier for beginners, here's what I've added so far. If anyone can think of more functionality to add then please let me know. I've made a primitive UI to make it easier for beginners to use (rather than cmdline args)
🕵️ MLT 🧙‍♂️ tweet media
English
1
1
7
1.2K
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
Does anyone know how I contact @ChainLands ? The Project Insecurity LTD member who was from NL? Need to contact him ASAP.
English
0
0
1
1.1K
godiego
godiego@_godiego__·
@0dayWizard @serverinspector Open redirect shouldn’t work as CSP will still block the redirected site (unless I’m missing something) 🤔
English
1
0
0
258
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
I asked this like a year ago but didn't get a response.. everything else for my chain is still working so I'll ask again.. Does anyone currently have JSNOP callback or open redirection in *.paypalobjects.net? I'll split the bounty with you if you've got one.
English
1
0
2
983
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@coffinxp7 Yeah I did see that the payload list covered some different contexts, but it would be cool to see a post breaking down each of those contexts and explaining the situations in which different context-specific payloads should be used. Either way, nice post.
English
1
0
1
237
Coffin
Coffin@lostsec_·
great point! that’s actually why I included a payload list in the article. it covers multiple contexts. you can use it with burp intruder to automate testing since manually checking each one is time consuming plus without knowing the backend query structure trial and error is often necessary. sometimes even a single backslash (\) can break the query and reveal valuable clues.
English
1
0
0
274
Coffin
Coffin@lostsec_·
This single article is enough to master SQL Injection for beginners. I've included all the methodologies I personally use to find SQLi vulnerabilities. I'll also be updating it soon with some SQLMap tamper bypass scripts and manual bypass techniques as soon as I get some free time infosecwriteups.com/mastering-sql-…
English
10
92
461
34.7K
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
Is there anything specific about this vuln that makes it more noteworthy than the thousands of other vulns that get reported to NASA?
English
2
0
0
578
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
Why is this even news? Someone reported a vuln to the VDP of probably the least secure .gov site in existence and somehow this is newsworthy? Does anyone even know what type of attack vector it was? Is there a writeup? I fail to see what makes this "breaking news"
News Arena India@NewsArenaIndia

BREAKING NEWS 🚨 📢 14 year old Yuvraj Gupta, who lives in Kanpur, Uttar Pradesh, has done a great feat. Hesaved the website of American space agency NASA from hackers. NASA has included him in the 'Hall of Fame' and also given him a letter of recognition.

English
6
0
5
1.8K
Daniel Kelley
Daniel Kelley@danielmakelley·
Reminder: There are talented people in cybersecurity who don't use social media.
English
3
1
22
2.1K
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@vxdb I get that this is the results of an investigation from 2023, but by now it's pretty much old news given that all of these markets are dead and the customers getting arrested are most likely dealers themselves. I can't see how this would disrupt any currently existing DNM's.
English
0
0
0
81
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@vxdb I'm assuming the buyers who got caught weren't just your typical buyers, but rather dealers themselves
English
1
0
0
107
vxdb
vxdb@vxdb·
US & Europol seized $200M, 144kg of fentanyl-laced drugs, and 180+ guns. Targets included dark web vendors, admins, and buyers from sites like Tor2Door, Bohemia, Kingdom Market, Nemesis and Incognito. This is a major blow to the darknet market scene.
vxdb tweet media
English
7
17
75
7.5K
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@coffinxp7 I see tons of people starting their payload with ' or %27 and just assuming it isn't vuln when that doesn't work, but I never see articles covering how payloads need to be tweaked for different context and in situations where starting with ' doesn't work, something like ") might
English
1
0
1
260
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@coffinxp7 Nice article, however one thing I NEVER see in articles regarding SQLi is context-specific payloads, i.e. how you need to change the start of your payload based upon where in the SQL statement your inputs are being reflected into.
English
1
0
1
674
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@serverinspector I've got an XSS in PayPal but their CSP is preventing me from triggering it, however if I can find JSONP callback or open redirection in paypalobjects.com then I'll be able to bypass the CSP and get my JS to trigger.
English
1
0
0
250
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@DexerTDP Lol I think I freaked them out cos I shared something in gov.ph so they kicked me from their private Keybase server thinking I was trying to bait them into getting v& and extradited to the Philippines I guess 🙃 I met some chill people in there though.
English
0
0
0
51
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@xitsec So it was literally just a case of reading that file from the extracted tarball and then connecting to their MySQLd using those creds. Second time I hacked them was using a CVE that had been public for several years. Even to this date they're vuln to tons of dumb BS like that..
English
0
0
0
173
🕵️ MLT 🧙‍♂️
🕵️ MLT 🧙‍♂️@0dayWizard·
@xitsec The first time I hacked NASA I found a wordpress installation there with open directory listings and a "backup.tar.gz" file -- the tarball was a backup of their WP site with wp-config.php included in there. Working plaintext MySQL creds in that file + open port 3306
English
1
0
0
166
xit! 🇮🇳
xit! 🇮🇳@xitsec·
Oh just saw the nasa hack post 😂 lol He is saying he got Youngest ethical hacker awards wtf ? How
English
8
0
33
6.4K