loopspell's profile picture. Script Kiddie | Senior Security Engineer | Core Pentester @cobalt_io

Ankit Kushwah

@loopspell

Script Kiddie | Senior Security Engineer | Core Pentester @cobalt_io

Ankit Kushwah reposted

Just launched CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it out! ctfsearch.hackmap.win

sarperavci's tweet image. Just launched CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it out!

ctfsearch.hackmap.win

Ankit Kushwah reposted

The results are in! We're proud to announce the Top ten web hacking techniques of 2024! portswigger.net/research/top-1…


Ankit Kushwah reposted

The system card (openai.com/index/openai-o…) nicely showcases o1's best moments -- my favorite was when the model was asked to solve a CTF challenge, realized that the target environment was down, and then broke out of its host VM to restart it and find the flag.

max_a_schwarzer's tweet image. The system card (openai.com/index/openai-o…) nicely showcases o1's best moments -- my favorite was when the model was asked to solve a CTF challenge, realized that the target environment was down, and then broke out of its host VM to restart it and find the flag.

Ankit Kushwah reposted

Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data. No one is safe from security mistakes, follow along to learn more 🧵

galnagli's tweet image. Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.

No one is safe from security mistakes, follow along to learn more 🧵

Ankit Kushwah reposted

Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Neither did we. Enjoy! portswigger.net/research/bypas…


Ankit Kushwah reposted

I recently co-authored a @Unit42_Intel blog about a unique IR case in which a threat actor’s custom EDR bypass (using #BYOVD) exposed their toolkit, methods, and even identity. Check out how we unmasked them through an opsec slip-up! #dfir unit42.paloaltonetworks.com/edr-bypass-ext…


Ankit Kushwah reposted

We're proud to announce LIGHTYEAR, a tool that let you dump files, blind, in PHP, based on a new algorithm. ambionics.io/blog/lightyear…


Ankit Kushwah reposted

🔥💀After 40 hours of constant reversing of weird looking c++ and no sleep, I Finally cooked the CVE-2024-47575 fortimanager unauthenticated RCE 🩸

we’re back, and despite all the buzz about FortiManager - the saga is about to continue. Please, remove this from the Internet *even if fully patched* speak soon.



Ankit Kushwah reposted

🔥 Microsoft fixed a high severity data exfiltration exploit chain in Copilot that I reported earlier this year. It was possible for a phishing mail to steal PII via prompt injection, including the contents of entire emails and other documents. The demonstrated exploit chain…


Ankit Kushwah reposted

New writeup: "Hacking Millions of Modems (and Investigating Who Hacked My Modem)" samcurry.net/hacking-millio… Thanks for reading! Huge thanks to @blastbots, @bbuerhaus, @infosec_au, @d0nutptr, @iangcarroll, and everyone who reviewed the post beforehand.


Ankit Kushwah reposted

I'm thrilled to announce "Listen to the whispers: web timing attacks that actually work" will premiere at Black Hat USA! After nine months of running bulk timing attacks on thousands of live sites, I've got a lot to share :D #BHUSA @BlackHatEvents blackhat.com/us-24/briefing…


Ankit Kushwah reposted

Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956) github.com/vulhub/vulhub/… This issue is similar to SpringMVC CVE-2018-1271 by @orange_8361

phithon_xg's tweet image. Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956)
github.com/vulhub/vulhub/…
This issue is similar to SpringMVC CVE-2018-1271 by @orange_8361
phithon_xg's tweet image. Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956)
github.com/vulhub/vulhub/…
This issue is similar to SpringMVC CVE-2018-1271 by @orange_8361

Ankit Kushwah reposted

Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF. codeanlabs.com/blog/research/…


Ankit Kushwah reposted

The tool is called 'HTTP Garden' by Ben Kallus and @parsingpunisher, and aims to make testing out technique concepts quick and easy. They've already used it to discover a ton of novel techniques - check out the docs and presentation! github.com/narfindustries…


Ankit Kushwah reposted

Everyone’s using ChatGPT. But almost everyone's STUCK in beginner mode. 10 techniques to get massively ahead with AI: (cut-and-paste these prompts👇)


Ankit Kushwah reposted

Super excited to release our car hacking research discussing vulnerabilities affecting hundreds of millions of vehicles, dozens of different car companies: samcurry.net/web-hackers-vs… Contributors: @_specters_ @bbuerhaus @xEHLE_ @iangcarroll, @sshell_ @infosec_au @NahamSec @rez0__


Ankit Kushwah reposted

A lot of us (in security) have marveled at #chatGPT's prowess for: - secure/insecure code - generating code and other use-cases, but we've not really explored its use-cases for Threat Modeling, which I think is game-changing. Here's why. A 🧵 1/


Loading...

Something went wrong.


Something went wrong.