0xacb's profile picture. Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack

André Baptista

@0xacb

Hacker grinding for L1gh7 and Fr33dφm, straight outta the cosmic realm. Co-founder @ethiack

Fijado

We won the MVH title at #h1702 🔥 @NahamSec @ajxchapman


Looking into a potential SSRF or OR but the server checks against a URL whitelist? Try the backslash trick! Due to a difference in URL specifications, some parsers will treat '\' the same as '/', while others will not. Here's an example payload:…


Tomorrow I'll be speaking at @lisbonai_! We're building faster than ever with AI. But are we building securely? I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do. See you there:…

0xacb's tweet image. Tomorrow I'll be speaking at @lisbonai_!

We're building faster than ever with AI. But are we building securely?

I'll show how agents can perform penetration testing and introduce Hackian: an autonomous agent that identifies vulnerabilities before attackers do.

See you there:…

André Baptista reposteó

As attack surfaces grow exponentially, driven by AI-accelerated development and increasing technical debt, security must scale accordingly. We've been intensely focused on building the future of security, and our Co-founder, André Baptista (@0xacb) is pulling back the curtain on…

ethiack's tweet image. As attack surfaces grow exponentially, driven by AI-accelerated development and increasing technical debt, security must scale accordingly.

We've been intensely focused on building the future of security, and our Co-founder, André Baptista (@0xacb) is pulling back the curtain on…

Just had an amazing time working with @ShopifyEng in Toronto 🍁 Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together. #togetherwehitharder #h1416 #shopify #hacking #goleafs

0xacb's tweet image. Just had an amazing time working with @ShopifyEng in Toronto 🍁

Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together.

#togetherwehitharder #h1416 #shopify #hacking #goleafs
0xacb's tweet image. Just had an amazing time working with @ShopifyEng in Toronto 🍁

Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together.

#togetherwehitharder #h1416 #shopify #hacking #goleafs
0xacb's tweet image. Just had an amazing time working with @ShopifyEng in Toronto 🍁

Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together.

#togetherwehitharder #h1416 #shopify #hacking #goleafs
0xacb's tweet image. Just had an amazing time working with @ShopifyEng in Toronto 🍁

Thanks @Hacker0x01 for organizing such an incredible event and bringing awesome researchers together.

#togetherwehitharder #h1416 #shopify #hacking #goleafs

André Baptista reposteó

The BsidesLisbon CTF Qualifiers are officially closed! Huge congrats to the Top 10 teams who will be moving on to the intense onsite finals. See the final rankings on the scoreboard here👉 quals.bsideslisbon.org/scoreboard

ethiack's tweet image. The BsidesLisbon CTF Qualifiers are officially closed!

Huge congrats to the Top 10 teams who will be moving on to the intense onsite finals.

See the final rankings on the scoreboard here👉 quals.bsideslisbon.org/scoreboard

If you found a dangling DNS record, you might be able to take control of it 👀 Be sure to check github.com/EdOverflow/can…, which has an extensive list of vulnerable services and guides on how to claim them.


Here's a quick little hacking tip that's landed me some interesting bugs. When you see an ID parameter, give it a little manual fuzz and see what happens: - Positive integer - Negative integer - Decimal points - Letters - Symbols - Really big number - 0 (Yeah, this one dumped…


André Baptista reposteó

I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints

castilho101's tweet image. I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with @LooseSecurity, he found that we can also use "https::"

This can be used to prevent URL parsing of href, allowing us to hit other endpoints

Modern websites use a lot of intermediary servers - caches, load balancers, proxies, and so on. You can try to send the 'Max-Forwards' header with your request to limit the amount of servers it will reach. It's defined in HTTP specs primarily for TRACE and OPTIONS methods,…


André Baptista reposteó

🚨@BsidesLisbon CTF Quals starts now! 🔓Join at: quals.bsideslisbon.org #CTF #BSidesLisbon

ethiack's tweet image. 🚨@BsidesLisbon CTF Quals starts now!
🔓Join at: quals.bsideslisbon.org

#CTF #BSidesLisbon

Prototype pollution is often missed. Here's how to find it. Prototype pollution is a powerful client-side vulnerability that can lead to XSS. The main requirements to exploit it are: - Unsafe parsing of user-controlled objects (via URL parameters, JSON, postMessages, etc.) - A…


André Baptista reposteó

As a homage to the work of @Blaklis_, our Security Researcher @softpoison_ debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at @SLCyberSec: slcyber.io/assetnote-secu…


André Baptista reposteó

Proud to announce that @ethiack will host this year’s #BSidesLisbon CTF! Test your offensive security skills in realistic challenges and compete against top hackers. 🗓️ Quals start Friday, 9PM Register now 👉 quals.bsideslisbon.org #CTF #Cybersecurity #OffensiveSecurity

Bsideslisbon's tweet image. Proud to announce that @ethiack will host this year’s #BSidesLisbon CTF!
Test your offensive security skills in realistic challenges and compete against top hackers.
🗓️ Quals start Friday, 9PM

Register now 👉 quals.bsideslisbon.org

#CTF #Cybersecurity #OffensiveSecurity

Recon tip: Run xnl-h4ck3r's waymore on the target you're testing. It searches for URLs from multiple sources, the Wayback Machine, Common Crawl, URLScan and more. It also provides a lot of options to filter your results. Check it out here 👇 github.com/xnl-h4ck3r/way…


André Baptista reposteó

As someone technical, you know that hacking systems is not necessarily a bad thing. It can actually be a good thing to detect vulnerabilities and correct them before someone with bad intentions explores it. @0xacb has spent over a decade hacking and understanding cybersecurity.…

lisbonai_'s tweet image. As someone technical, you know that hacking systems is not necessarily a bad thing.

It can actually be a good thing to detect vulnerabilities and correct them before someone with bad intentions explores it.

@0xacb has spent over a decade hacking and understanding cybersecurity.…

Found an XSS but got blocked by the CSP? cspbypass.com has a compiled list of ways to bypass the Content-Security Policy. Check out the video below 👇


If your hacking method looks like everyone else’s, so will your findings. My advice is to get weird. Bug bounty wins come from being different. Everyone checks the basics. You need to hunt the edges, the overlooked, the strange. Go past the checklist, and you'll land what others…


André Baptista reposteó

A mini research I did about escalating an XSS using 414 and 431 server size limit errors, and how I escalated an XSS to account takeover using a Salesforce URL Limit Gadget on a Ecommerce website. Hope you enjoy it castilho.sh/scream-until-e…


Loading...

Something went wrong.


Something went wrong.