0xmahesh's profile picture. Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Mahesh Bheema

@0xmahesh

Security Enthusiast | OSCP | OSWP | Null Hyderabad Chapter Lead

Mahesh Bheema 已轉發

The $5 Membership sale is now live! The sale lasts until July 17 23:59 UTC: account.shodan.io/billing/member


Mahesh Bheema 已轉發

May meet registrations are open. Register before it's too late here nullhydmay2023.eventbrite.com. Date: May 27th Venue:@Servicenow #NullHyd @null0x00 @vhssunny1 @pavanw3b @badc0d3r @0xmahesh


Mahesh Bheema 已轉發

🛠️ These are my go-to #DevSecOps tools at all stages of the DevSecOps lifecycle. These are all OSS (not paid tools) so you wont spend a $ buying them


Mahesh Bheema 已轉發

In this video walkthrough, we break down the basic info of CVE-2023-23397 the zero-day, zero-touch vulnerability that was rated 9.8 on the #CVSS scale. Follow this thread as we detail the general exploitation routine of this #vulnerability. research.trendmicro.com/cve202323397


Mahesh Bheema 已轉發

We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

MDSecLabs's tweet image. We've just published a quick write up on CVE-2023-23397, which allows a remote adversary to leak NetNTLMv2 hashes: mdsec.co.uk/2023/03/exploi… by @domchell

Mahesh Bheema 已轉發

Automatically configure a vulnerable Active Directory network on AWS : - 6 VMs - 1 linux server with GLPI - 3 domains Perfect to share a vulnerable lab with other people #activedirectory #aws #pentest #ad #LordOfTheRings github.com/0xBallpoint/LO…


Mahesh Bheema 已轉發

Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help. Full quality here : orange-cyberdefense.github.io/ocd-mindmaps/i…

M4yFly's tweet image. Mindmap upgrade version 2023_02 thx to @Jenaye_fr and @DaahtK for the help.

Full quality here :
orange-cyberdefense.github.io/ocd-mindmaps/i…

Mahesh Bheema 已轉發

Learning from others is amazing, but how do you find the content you're looking for? @payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine! hubs.li/Q01B0C100 #bugbounty #bugbountytips 👇

intigriti's tweet image. Learning from others is amazing, but how do you find the content you're looking for?

@payloadartist solved that problem by creating the Bug Bounty Hunting Search Engine!
hubs.li/Q01B0C100

#bugbounty #bugbountytips 👇

Mahesh Bheema 已轉發

After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

0x09AL's tweet image. After an unhealthy amount of hours put into this, I finally managed to get RCE on Cobalt Strike. I would recommend avoiding it for a while as CVE-2022-39197 is not sufficient.

Mahesh Bheema 已轉發

The individual who breached Rockstar Games states they got initial access by social engineering an employee. They are currently on 4chan sharing material and chatting. boards.4channel.org/v/thread/61249…

We take the weekend off and Grand Theft Auto 6 material is leaked online from an alleged breach of Rockstar Games. Fun. The people on GTA forums, similar to Uber, believed it to be a hoax and mocked the leaker. gtaforums.com/topic/985481-g…



Mahesh Bheema 已轉發

[BLOG] Fun post on how to combine evilginx by @mrgretzky and BITB by @mrd0x. rastamouse.me/evilginx-meet-…


Mahesh Bheema 已轉發

I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇 Here is the link to the Github repository: github.com/Nickyie/Cybers… #Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Nickieyey's tweet image. I have compiled a list of Best Cybersecurity Youtube Channels, that talk about various topics related to cybersecurity. Do check it out 👇

Here is the link to the Github repository: github.com/Nickyie/Cybers…

#Pentesting #CyberSec #cyberawarness #bugbounty #infosec #bugbounty

Mahesh Bheema 已轉發

Some pics from @nullhyd July meet. Talks: News Bytes by Karan Cloud Security & S3 by @Aravind_JMA Cloud Security Zero to One by Ravi Teja Intro to Threat Hunting by @dmred1 Venue sponsor: @ServiceNow #nullHyd #InfoSec @null0x00

pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00
pavanw3b's tweet image. Some pics from @nullhyd July meet.

Talks:
News Bytes by Karan
Cloud Security & S3 by @Aravind_JMA 
Cloud Security Zero to One by Ravi Teja
Intro to Threat Hunting by @dmred1 

Venue sponsor: @ServiceNow 

#nullHyd #InfoSec @null0x00

Mahesh Bheema 已轉發

Bug Bounty Hint If you have found that server is running PHP - you can try to test it for RCE vulnerability. Append following header to request: User-Agentt: zerodiumsystem("id") If PHP version is vulnerable - you will execute system("id") command on a server.

therceman's tweet image. Bug Bounty Hint

If you have found that server is running PHP - you can try to test it for RCE vulnerability.

Append following header to request:
User-Agentt: zerodiumsystem("id")

If PHP version is vulnerable - you will execute system("id") command on a server.

Mahesh Bheema 已轉發

How we got here:

來自 live.bet

Loading...

Something went wrong.


Something went wrong.