ctf_sec's profile picture. Information Security | Cyber Security | Web App Pentesting |

CTF Security

@ctf_sec

Information Security | Cyber Security | Web App Pentesting |

置頂

⚠️ New video alert! ⚠️ Just uploaded a detailed walkthrough of @hack_sparo Death Note challenge on THM! 🚀 File upload exploits, SSH Misconfig, File immutability & Append Only attributes and Simple Docker breakouts. Check it out with the link below! 👇 youtu.be/emBZdoqjsCc


Exploiting Path Traversal on Ruby on Rails 7.1.4 to Access config/database.yml – Leaking Database Credentials


CTF Security 已轉發

Bypassing XSS blacklist filters gist.github.com/shuding/8b1ec4…

r007User's tweet image. Bypassing XSS blacklist filters 
gist.github.com/shuding/8b1ec4…

What if you could log in as anyone, make yourself an admin, and change grades? Login bypass, tweaking session, decrypting user IDs, and rewriting student grades in the DB. youtube.com/@ctf-sec Drops at 12 AM! Stay tuned. #ctfsec #websec #cybersecurity #session #sqli

ctf_sec's tweet image. What if you could log in as anyone, make yourself an admin, and change grades? Login bypass, tweaking session, decrypting user IDs, and rewriting student grades in the DB. 

youtube.com/@ctf-sec

Drops at 12 AM! Stay tuned. 
#ctfsec #websec #cybersecurity  #session #sqli

CTF Security 已轉發

If the target system is running Google Chrome Debugger with specific port, we can port forward and may be able to retrieve sensitive data in browser debugging mode. exploit-notes.hdks.org/exploit/linux/…

r007User's tweet image. If the target system is running Google Chrome Debugger with specific port, we can port forward and may be able to retrieve sensitive data in browser debugging mode.

exploit-notes.hdks.org/exploit/linux/…

CTF Security 已轉發

Sometimes it's just right in front of you. EFCC Hacked Phantom

r007User's tweet image. Sometimes it's just right in front of you.

EFCC Hacked Phantom

Happy New Year from @ctf_sec Here’s to a BIG 2025 filled with growth, learning, and responsible hacking. Let’s crush new challenges and level up together. Stay sharp! 💻 #BIG2025 #HappyNewYear2025 #CyberSecurity

ctf_sec's tweet image. Happy New Year from @ctf_sec
Here’s to a BIG 2025 filled with growth, learning, and responsible hacking. Let’s crush new challenges and level up together. Stay sharp! 💻 #BIG2025 #HappyNewYear2025 #CyberSecurity

Breaking down the Pizza Paradise challenge from Intigriti CTF 2024. Client-side validation flaws, hashing scripting credential leakage, and path traversal exploits. youtu.be/5TMSZWVRpvU?si…

ctf_sec's tweet card. Hacking Pizza Paradise: Exploiting Client-Side Validation & Path...

youtube.com

YouTube

Hacking Pizza Paradise: Exploiting Client-Side Validation & Path...


CTF Security 已轉發

why this SQL get paid 15K and my SQL get paid 2K on the same scope.... we should understand that its all the time depends on the impact not the bug it self Ex: impact of SQL injection in a **store app** not like impact in a **docs app** Ex: /.git/ bug ==> in general its a P3…


CTF Security 已轉發

How would you bypass this XSS filter? #XSS #Websecurity #ctfseurity #ctfsec

r007User's tweet image. How would you bypass this XSS filter?

#XSS #Websecurity #ctfseurity #ctfsec

Last Thursday's Twitch live stream on hacking Ticketastick hacker101 CTF is now available on both Twitch and YouTube! Watch it anytime and catch all the action. Don't forget to follow and subscribe! Twitch: twitch.tv/ctfsec YouTube: youtu.be/s1Fab1UbiMU?si…

ctf_sec's tweet image. Last Thursday's Twitch live stream on hacking Ticketastick hacker101 CTF is now available on both Twitch and YouTube! Watch it anytime and catch all the action.

Don't forget to follow and subscribe!
Twitch: twitch.tv/ctfsec
YouTube: youtu.be/s1Fab1UbiMU?si…

File Inclusion to PHP Remote Code Execution (RCE): Gaining Control and Executing Arbitrary Commands. youtu.be/7e1XA7eIyhU #Webappsec #php #webhacking


CTF Security 已轉發

Hey amazing hackers ! 👋What have you hacked recently or what are you struggling with?? let me know in the comments below 🧨🔥


Check out @r007User's insightful explanation on the security risks of using string interpolation and setting subprocess call(shell=True) in Python. Essential for anyone invested in secure coding practices youtu.be/SaZDeUMEXJY


Exciting update! 🚨 Our latest tutorial on Exploiting Blind SQL Injection to Execute OS Commands is now live. Learn how to turn a vulnerability into full system control youtu.be/SaZDeUMEXJY

ctf_sec's tweet image. Exciting update! 🚨 Our latest tutorial on Exploiting Blind SQL Injection to Execute OS Commands is now live. Learn how to turn a vulnerability into full system control

youtu.be/SaZDeUMEXJY

CTF Security 已轉發

I don't usually use Ghauri for SQL, but I'm giving it a try to see how it fits into my toolkit.

r007User's tweet image. I don't usually use Ghauri for SQL, but I'm giving it a try to see how it fits into my toolkit.

Loading...

Something went wrong.


Something went wrong.