0xmahesh's profile picture. Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Mahesh Bheema

@0xmahesh

Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Mahesh Bheema รีโพสต์แล้ว

The $5 Membership sale is now live! The sale lasts until July 17 23:59 UTC: account.shodan.io/billing/member


Mahesh Bheema รีโพสต์แล้ว

May meet registrations are open. Register before it's too late here nullhydmay2023.eventbrite.com. Date: May 27th Venue:@Servicenow #NullHyd @null0x00 @vhssunny1 @pavanw3b @badc0d3r @0xmahesh


Mahesh Bheema รีโพสต์แล้ว

April meet registrations are open. Register before it's too late. Date: April 22 Venue: @EPAMSystems nullhydapr2023.eventbrite.com #NullHyd @null0x00 @vhssunny1 @0xmahesh @badc0d3r @pavanw3b


Mahesh Bheema รีโพสต์แล้ว

🛠️ These are my go-to #DevSecOps tools at all stages of the DevSecOps lifecycle. These are all OSS (not paid tools) so you wont spend a $ buying them


Mahesh Bheema รีโพสต์แล้ว

In this video walkthrough, we break down the basic info of CVE-2023-23397 the zero-day, zero-touch vulnerability that was rated 9.8 on the #CVSS scale. Follow this thread as we detail the general exploitation routine of this #vulnerability. research.trendmicro.com/cve202323397


Mahesh Bheema รีโพสต์แล้ว

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

MDSecLabs's tweet image. We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

Mahesh Bheema รีโพสต์แล้ว

#NullHyd's March registrations are open. Reserve a seat before it's too late. nullhydmar2023.eventbrite.com @0xmahesh @vhssunny1 @pavanw3b


Mahesh Bheema รีโพสต์แล้ว

Automatically configure a vulnerable Active Directory network on AWS : - 6 VMs - 1 linux server with GLPI - 3 domains Perfect to share a vulnerable lab with other people #activedirectory #aws #pentest #ad #LordOfTheRings github.com/0xBallpoint/LO…


Mahesh Bheema รีโพสต์แล้ว

Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help. Full quality here : orange-cyberdefense.github.io/ocd-mindmaps/i…

M4yFly's tweet image. Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help.

Full quality here :
orange-cyberdefense.github.io/ocd-mindmaps/i…

Mahesh Bheema รีโพสต์แล้ว

Learning from others is amazing, but how do you find the content you're looking for? @payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine! hubs.li/Q01B0C100 #bugbounty #bugbountytips 👇

intigriti's tweet image. Learning from others is amazing, but how do you find the content you're looking for?

@payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine!
hubs.li/Q01B0C100

#bugbounty #bugbountytips 👇

Mahesh Bheema รีโพสต์แล้ว

After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

0x09AL's tweet image. After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

Mahesh Bheema รีโพสต์แล้ว

The individual who breached Rockstar Games states they got initial access by social engineering an employee. They are currently on 4chan sharing material and chatting. boards.4channel.org/v/thread/61249…

We take the weekend off and Grand Theft Auto 6 material is leaked online from an alleged breach of Rockstar Games. Fun. The people on GTA forums, similar to Uber, believed it to be a hoax and mocked the leaker. gtaforums.com/topic/985481-g…



Mahesh Bheema รีโพสต์แล้ว

[BLOG] Fun post on how to combine evilginx by @mrgretzky and BITB by @mrd0x. rastamouse.me/evilginx-meet-…


Mahesh Bheema รีโพสต์แล้ว

I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇 Here is the link to the Github repository: github.com/Nickyie/Cybers… #Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Nickieyey's tweet image. I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇

Here is the link to the Github repository: github.com/Nickyie/Cybers…

#Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Mahesh Bheema รีโพสต์แล้ว

Some pics from @nullhyd July meet. Talks: News Bytes by Karan Cloud Security & S3 by @Aravind_JMA Cloud Security Zero to One by Ravi Teja Intro to Threat Hunting by @dmred1 Venue sponsor: @ServiceNow #nullHyd #InfoSec @null0x00

pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00

Mahesh Bheema รีโพสต์แล้ว

Bug Bounty Hint If you have found that server is running PHP - you can try to test it for RCE vulnerability. Append following header to request: User-Agentt: zerodiumsystem("id") If PHP version is vulnerable - you will execute system("id") command on a server.

therceman's tweet image. Bug Bounty Hint

If you have found that server is running PHP - you can try to test it for RCE vulnerability.

Append following header to request:
User-Agentt: zerodiumsystem("id")

If PHP version is vulnerable - you will execute system("id") command on a server.

Mahesh Bheema รีโพสต์แล้ว

How we got here:

จาก live.bet

Loading...

Something went wrong.


Something went wrong.