0xmahesh's profile picture. Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Mahesh Bheema

@0xmahesh

Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Repost di Mahesh Bheema

The $5 Membership sale is now live! The sale lasts until July 17 23:59 UTC: account.shodan.io/billing/member


Repost di Mahesh Bheema

May meet registrations are open. Register before it's too late here nullhydmay2023.eventbrite.com. Date: May 27th Venue:@Servicenow #NullHyd @null0x00 @vhssunny1 @pavanw3b @badc0d3r @0xmahesh


Repost di Mahesh Bheema

April meet registrations are open. Register before it's too late. Date: April 22 Venue: @EPAMSystems nullhydapr2023.eventbrite.com #NullHyd @null0x00 @vhssunny1 @0xmahesh @badc0d3r @pavanw3b


Repost di Mahesh Bheema

🛠️ These are my go-to #DevSecOps tools at all stages of the DevSecOps lifecycle. These are all OSS (not paid tools) so you wont spend a $ buying them


Repost di Mahesh Bheema

In this video walkthrough, we break down the basic info of CVE-2023-23397 the zero-day, zero-touch vulnerability that was rated 9.8 on the #CVSS scale. Follow this thread as we detail the general exploitation routine of this #vulnerability. research.trendmicro.com/cve202323397


Repost di Mahesh Bheema

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

MDSecLabs's tweet image. We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

Repost di Mahesh Bheema

#NullHyd's March registrations are open. Reserve a seat before it's too late. nullhydmar2023.eventbrite.com @0xmahesh @vhssunny1 @pavanw3b


Repost di Mahesh Bheema

Automatically configure a vulnerable Active Directory network on AWS : - 6 VMs - 1 linux server with GLPI - 3 domains Perfect to share a vulnerable lab with other people #activedirectory #aws #pentest #ad #LordOfTheRings github.com/0xBallpoint/LO…


Repost di Mahesh Bheema

Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help. Full quality here : orange-cyberdefense.github.io/ocd-mindmaps/i…

M4yFly's tweet image. Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help.

Full quality here :
orange-cyberdefense.github.io/ocd-mindmaps/i…

Repost di Mahesh Bheema

Learning from others is amazing, but how do you find the content you're looking for? @payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine! hubs.li/Q01B0C100 #bugbounty #bugbountytips 👇

intigriti's tweet image. Learning from others is amazing, but how do you find the content you're looking for?

@payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine!
hubs.li/Q01B0C100

#bugbounty #bugbountytips 👇

Repost di Mahesh Bheema

After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

0x09AL's tweet image. After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

Repost di Mahesh Bheema

The individual who breached Rockstar Games states they got initial access by social engineering an employee. They are currently on 4chan sharing material and chatting. boards.4channel.org/v/thread/61249…

We take the weekend off and Grand Theft Auto 6 material is leaked online from an alleged breach of Rockstar Games. Fun. The people on GTA forums, similar to Uber, believed it to be a hoax and mocked the leaker. gtaforums.com/topic/985481-g…



Repost di Mahesh Bheema

[BLOG] Fun post on how to combine evilginx by @mrgretzky and BITB by @mrd0x. rastamouse.me/evilginx-meet-…


Repost di Mahesh Bheema

I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇 Here is the link to the Github repository: github.com/Nickyie/Cybers… #Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Nickieyey's tweet image. I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇

Here is the link to the Github repository: github.com/Nickyie/Cybers…

#Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Repost di Mahesh Bheema

Some pics from @nullhyd July meet. Talks: News Bytes by Karan Cloud Security & S3 by @Aravind_JMA Cloud Security Zero to One by Ravi Teja Intro to Threat Hunting by @dmred1 Venue sponsor: @ServiceNow #nullHyd #InfoSec @null0x00

pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00

Repost di Mahesh Bheema

Bug Bounty Hint If you have found that server is running PHP - you can try to test it for RCE vulnerability. Append following header to request: User-Agentt: zerodiumsystem("id") If PHP version is vulnerable - you will execute system("id") command on a server.

therceman's tweet image. Bug Bounty Hint

If you have found that server is running PHP - you can try to test it for RCE vulnerability.

Append following header to request:
User-Agentt: zerodiumsystem("id")

If PHP version is vulnerable - you will execute system("id") command on a server.

Repost di Mahesh Bheema

How we got here:


Loading...

Something went wrong.


Something went wrong.