r00tdaddy

114 posts

r00tdaddy

r00tdaddy

@rootd4ddy

169.254.169.254 شامل ہوئے Nisan 2023
395 فالونگ30 فالوورز
r00tdaddy
r00tdaddy@rootd4ddy·
@I_Am_Jakoby Look at the image @I_Am_Jakoby, this wasn’t a leak.. pops doesn’t know how autofill works 😆. There’s at best, a handful of numbers left in that scroll bar…
English
0
0
1
125
dawgyg - WoH
dawgyg - WoH@thedawgyg·
@Azx7af i may do some of this, but its tricky, because i cant share my screen while i do. so i could only be on camera and talking to everyone. live hacking while sharing screen would violate the RoE since it would disclose anything i found to people against policy before its fixed
English
1
0
6
529
dawgyg - WoH
dawgyg - WoH@thedawgyg·
So as some noticed, I am now doing alot of fuzzing. (11 0days found in the last 8 days between 3 major tools/libraries). Currently working on getting a UAF RCE triaged now. Would people find it helpful/useful if I were to blog about how I found them? #hacking #hacker #bugbounty
English
33
10
474
26.1K
Travis Caverhill
Travis Caverhill@CaverhillTravis·
@The_Cyber_News I think it is hilarious that people say how this is irrelevant because it was released 2 years ago... Not everyone does patch management, if they did, SQL Injections and XSS attacks would no longer exist.
English
1
0
1
432
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 PoC Exploit Released For Outlook 0-Click Remote Code Execution Vulnerability Source: cybersecuritynews.com/outlook-remote… A Proof-of-Concept (PoC) exploit code has been released for a critical remote code execution (RCE) vulnerability in Microsoft Outlook, identified as CVE-2024-21413. Dubbed “MonikerLink,” this flaw allows attackers to bypass Outlook’s security mechanisms, specifically the “Protected View,” to execute malicious code or steal credentials. The release of this PoC highlights the continued risk posed by this vulnerability and serves as a training tool for security professionals to understand the attack vector.​ #cybersecuritynews #vulnerability
Cyber Security News tweet media
English
7
146
443
41.4K
vx-underground
vx-underground@vxunderground·
Giveaway time. Our friends at @cyberwarfarelab have gifted us AIO (All In One) Access to ALL of their courses for TWO PEOPLE You'll have access to the following courses (including labs). It is a lot. You're not expected to complete everything. This is valued at over $11,000. If you're gifted this you're expected to actually do something and not be a bum. This is a life changing giveaway. If you win this giveaway, bucked up, and lock in, you could be big brain real fast. Don't squander this. How to enter: - Leave a comment - ??? - I like cats Red Teaming: - Web Red Team Analyst [Web-RTA] - Active Directory Red Team Specialist [AD-RTS] - Enterprise Lateral Movement Specialist [CELMS] - Red Team Analyst [CRTA] - Red Team Specialist [CRTS V2] - Red Team Infra Dev [CRT-ID] - Stealth Cyber Operator [CSCO] Blue Teaming: - Blue Team Fundamentals [BTF] - Cyber Defence Analyst [CCDA] Purple Teaming: - Purple Teaming Fundamentals-C-Edition - Process Injection Analyst [CPIA] - Purple Team Analyst [CPTA V2] Cloud Security: - Multi-Cloud Red Team Analyst [MCRTA] - Hybrid Multi-Cloud Red Team Specialist [CHMRTS] - Google Cloud Red Team Specialist [CGRTS] - AWS Cloud Red Team Specialist [CARTS] - Multi-Cloud Blue Team Analyst [MCBTA] Ethical Hacking (Introduction courses): - Cyber Security Analyst [C3SA] - Certified Cyber Security Engineer [CCSE] Evasion & Exploitation: - Red Team – CredOps Infiltrator [CRT-COI] - Enterprise Sec. Controls Attack Specialist [CESC-AS] - Windows Internals Red Team Operator [CWI-RTO] - Certified Exploit Development Professional [CEDP] DevOps: - Certified DevOps Red Team Analyst (DO-RTA) Kubernetes Security: - K8s Red Team Analyst (K8s-RTA)
English
926
134
1.2K
73.8K
Wilson Boluwatife
Wilson Boluwatife@GreatbabyGb·
@Dghost_Ninja They just closed it as P5 informational as i couldn't exploit the finding further
English
2
0
0
91
Wilson Boluwatife
Wilson Boluwatife@GreatbabyGb·
I found/reported my first ever bug on a vdp program, really happy cause it was a boost on my confidence. Found a dev page that was open to the public, didn't find anything at first until i proxy the http request to that site and found an api endpoint exposing client id
Wilson Boluwatife tweet media
English
5
3
57
2.7K
r00tdaddy
r00tdaddy@rootd4ddy·
@techspence Only deny logon locally for workstations? What about the various other logon methods that cache credentials.
English
2
0
4
556
spencer
spencer@techspence·
More sysadmins need to know this… User logon restrictions are free. Create a GPO and call it “DC Logon Restrictions - Domain Admins Only” Configure User Rights Assignment for DA accounts to log on locally on domain controllers and deny log on locally on end-user workstations.
English
7
30
245
17.2K
bytehx
bytehx@bytehx343·
Qualified for final round of #SPIRITCYBER2025
YesWeHack ⠵@yeswehack

🇸🇬 Big week for @yeswehack at #SICW2025! The #SPIRITCYBER25 Hackathon will see 6 elite teams competing live on 22–23 Oct to strengthen Singapore’s critical #IoT systems. 🏆 From 30+ teams which participated in the 4-week qualifiers, these top hunters have earned their spot in the finals: 🔹zamny zamn zamn: @elma_ios, @sunsh1nefact0ry, @junr0n 🔹Obsidian Ghost Protocol: @spaceraccoon, Zhong Liang Ou-Yang, Azer WHR 🔹Peenoise: @shipcod3, @jeroldcamacho, @japzdivino 🔹Testalways: @testalways 🔹NullIoT: @bytehx343 @0xakm, @mgthura404 🔹saltedeggchicken: @Sn0rkY, Cher Boon Sim, @nbuzydebat

English
2
0
8
630
DIESEL DISPENSARY
DIESEL DISPENSARY@CryptoChronicX·
Who wants a free jar of our brand new 90u Small Batch Live Rosin Hash?! Leave a Comment ⭐️ We will randomly generate winner to receive some free jars of our brand new 90u Rosin Ends Soon ⏳️
English
670
92
1.1K
72.6K
r00tdaddy
r00tdaddy@rootd4ddy·
@rez0__ This has been making its rounds for at least 3 months now.
English
0
0
0
164
Joseph Thacker
Joseph Thacker@rez0__·
🚨 BE CAREFUL OUT THERE This is a new scam tactic. It looks like they properly spoofed a third party X app. If you authorize the app, they can do basically anything on your account.
Joseph Thacker tweet mediaJoseph Thacker tweet media
English
62
99
386
83.6K
r00tdaddy
r00tdaddy@rootd4ddy·
@techspence Your missing a whole lot here @techspence Deny access to this computer from the network Deny log on as a batch job Deny log on as a service What about all the other T0 builtin groups? EA,Account Operators,administrators, dnsadmins,dcom, cert publishers etc.
English
0
0
2
57
spencer
spencer@techspence·
Domain Admin shouldn’t logon to workstations. Here’s one way to restrict DA logins to workstations: Create a GPO… Computer Config → Windows Settings → Security Settings → Local Policies → User Rights Assignment → ‘Deny log on locally’ & ‘Deny log on through RDP’ → add Domain Admins Apply to workstations Done. Did I miss anything?
English
33
64
526
39K
r00tdaddy
r00tdaddy@rootd4ddy·
@wadgamaraldeen I’m saying you didn’t try hard enough. Is there another gadget to chain it with at this moment? Maybe, maybe not. That’s what’s notes and JavaScript monitoring is for. Come back to it later. Reporting an open redirect on any bbp today will likely yield similar results.
English
0
0
0
14
Mustafa Adam Gamaraldin Abdalla 🇸🇩♥️
@rootd4ddy Who said i didn't try to escalate it and increase impact Tried XSS and many other bugs before reporting it And there is no 0AUTH implementation to try theft token's Open redirect itself without Escalation is rated as low/medium severity It varies from program to another
English
1
0
0
41
r00tdaddy
r00tdaddy@rootd4ddy·
@wadgamaraldeen But it did have zero impact to the company. You’re presenting a hypothetical. The quicker you understand that the quicker you will find real bugs. You should have kept that open redirect in your notes. Combined with an xss on another page would be an ato.
English
2
0
0
38
Mustafa Adam Gamaraldin Abdalla 🇸🇩♥️
@rootd4ddy I want to clarify something: I was never upset about not receiving a bounty, or about the decision to treat the vulnerability as low impact — even though calling it "zero impact" is a bit of a stretch, especially when it was acknowledged, fixed, and impacted authenticated users.
English
1
0
0
84
Gavin K
Gavin K@atomiczsec·
just got access to @PerplexityComet, lets see what this can do for security research : ) I have some invites if people want to try it out 🔥
Gavin K tweet media
English
5
0
17
2.3K
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
@PinkDraconian Chill bro. You can escalate They’ll triage. It happens Open a blocker
English
3
0
4
859
PinkDraconian
PinkDraconian@PinkDraconian·
Please help me understand how the @Bugcrowd triage works. I've provided - Video PoC - Python file that spins up an attacker server to showcase the exploit Does @Bugcrowd have some requirement for me to host the exploit server? 1/2
PinkDraconian tweet media
English
14
9
211
45.2K
Northstar
Northstar@NorthstarCharts·
BITCOIN - It may turn out differently this time, but I don't want to ignore this entirely...
Northstar tweet media
English
65
57
412
48.7K
SniperAlert
SniperAlert@StockOptions888·
I AM OFFICIALLY RESTARTING THE $1,000 TO $1,000,000 $SPY CHALLENGE NEXT MONDAY! 💸 I’M GOING TO RESTART AND LET EVERYONE FOLLOW MY EXACT TRADES FOR COMPLETELY FREE IN A PRIVATE X GROUP CHAT! 🦅 LIKE, REPOST, & COMMENT “$1K” TO BE ADDED! ❤️‍🔥 YOU MUST BE FOLLOWING ME TO JOIN! ☢️
SniperAlert tweet media
English
1.4K
95
289
364.7K