Ankit Kushwah
@loopspell
Script Kiddie | Senior Security Engineer | Core Pentester @cobalt_io
You might like
Just launched CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it out! ctfsearch.hackmap.win
The results are in! We're proud to announce the Top ten web hacking techniques of 2024! portswigger.net/research/top-1…
The system card (openai.com/index/openai-o…) nicely showcases o1's best moments -- my favorite was when the model was asked to solve a CTF challenge, realized that the target environment was down, and then broke out of its host VM to restart it and find the flag.
Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data. No one is safe from security mistakes, follow along to learn more 🧵
Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Neither did we. Enjoy! portswigger.net/research/bypas…
Check out our latest blog post! We dive into GitHub Enterprise’s SAML implementation and explore an authentication bypass in encrypted assertion mode. CVE-2024-4985 / CVE-2024-9487: GitHub Enterprise SAML Authentication Bypass. projectdiscovery.io/blog/github-en…
projectdiscovery.io
GitHub Enterprise SAML Authentication Bypass (CVE-2024-4985 / CVE-2024-9487) — ProjectDiscovery Blog
Introduction In light of the recent Ruby-SAML bypass discovered in GitLab, we set out to examine the SAML implementation within GitHub Enterprise. During our research, we identified a significant...
I recently co-authored a @Unit42_Intel blog about a unique IR case in which a threat actor’s custom EDR bypass (using #BYOVD) exposed their toolkit, methods, and even identity. Check out how we unmasked them through an opsec slip-up! #dfir unit42.paloaltonetworks.com/edr-bypass-ext…
We're proud to announce LIGHTYEAR, a tool that let you dump files, blind, in PHP, based on a new algorithm. ambionics.io/blog/lightyear…
🔥💀After 40 hours of constant reversing of weird looking c++ and no sleep, I Finally cooked the CVE-2024-47575 fortimanager unauthenticated RCE 🩸
we’re back, and despite all the buzz about FortiManager - the saga is about to continue. Please, remove this from the Internet *even if fully patched* speak soon.
🔥 Microsoft fixed a high severity data exfiltration exploit chain in Copilot that I reported earlier this year. It was possible for a phishing mail to steal PII via prompt injection, including the contents of entire emails and other documents. The demonstrated exploit chain…
New writeup: "Hacking Millions of Modems (and Investigating Who Hacked My Modem)" samcurry.net/hacking-millio… Thanks for reading! Huge thanks to @blastbots, @bbuerhaus, @infosec_au, @d0nutptr, @iangcarroll, and everyone who reviewed the post beforehand.
I'm thrilled to announce "Listen to the whispers: web timing attacks that actually work" will premiere at Black Hat USA! After nine months of running bulk timing attacks on thousands of live sites, I've got a lot to share :D #BHUSA @BlackHatEvents blackhat.com/us-24/briefing…
Nexus Repository Manager 3 Unauthenticated Path Traversal (CVE-2024-4956) github.com/vulhub/vulhub/… This issue is similar to SpringMVC CVE-2018-1271 by @orange_8361
Just released the write-up for CVE-2024-4367, a bug I found recently in PDF.js (and hence in Firefox), resulting in arbitrary JavaScript execution when opening a malicious PDF. codeanlabs.com/blog/research/…
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion and wondered if there were any other CFML Servers. That's when we met Lucee. blog.projectdiscovery.io/hello-lucee-le…
projectdiscovery.io
Hello Lucee! Let us hack Apple again? — ProjectDiscovery Blog
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion, we derived valuable insights, one of which revolved around CFM and CFC handling, parsing and executi...
Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k! blog.projectdiscovery.io/hello-lucee-le…
projectdiscovery.io
Hello Lucee! Let us hack Apple again? — ProjectDiscovery Blog
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion, we derived valuable insights, one of which revolved around CFM and CFC handling, parsing and executi...
The tool is called 'HTTP Garden' by Ben Kallus and @parsingpunisher, and aims to make testing out technique concepts quick and easy. They've already used it to discover a ton of novel techniques - check out the docs and presentation! github.com/narfindustries…
Everyone’s using ChatGPT. But almost everyone's STUCK in beginner mode. 10 techniques to get massively ahead with AI: (cut-and-paste these prompts👇)
Super excited to release our car hacking research discussing vulnerabilities affecting hundreds of millions of vehicles, dozens of different car companies: samcurry.net/web-hackers-vs… Contributors: @_specters_ @bbuerhaus @xEHLE_ @iangcarroll, @sshell_ @infosec_au @NahamSec @rez0__
A lot of us (in security) have marveled at #chatGPT's prowess for: - secure/insecure code - generating code and other use-cases, but we've not really explored its use-cases for Threat Modeling, which I think is game-changing. Here's why. A 🧵 1/
United States Trends
- 1. Packers 93.5K posts
- 2. Eagles 121K posts
- 3. Jordan Love 14.3K posts
- 4. #WWERaw 122K posts
- 5. Matt LaFleur 7,901 posts
- 6. AJ Brown 6,511 posts
- 7. $MONTA 1,269 posts
- 8. Jaelan Phillips 7,160 posts
- 9. Patullo 11.9K posts
- 10. #GoPackGo 7,745 posts
- 11. Smitty 5,367 posts
- 12. McManus 4,078 posts
- 13. Sirianni 4,779 posts
- 14. Grayson Allen 3,157 posts
- 15. Cavs 10.5K posts
- 16. #MondayNightFootball 1,911 posts
- 17. Pistons 14.6K posts
- 18. Devonta Smith 5,831 posts
- 19. John Cena 98.8K posts
- 20. Wiggins 11.8K posts
You might like
-
Seasides
@seasides_conf -
Armaan Pathan
@armaancrockroax -
pwnmachine 👾
@princechaddha -
gujjuboy10x00
@vis_hacker -
Cyber Advising
@cyber_advising -
Rakesh Mane
@RakeshMane10 -
pikpikcu
@pikpikcu -
The Bug Bounty Hunter
@tbbhunter -
Lalit
@0xklaue -
x86matthew
@x86matthew -
Rudra Sarkar
@rudr4_sarkar -
Mayfly
@M4yFly -
William Bowling @[email protected]
@wcbowling -
abdulsec
@moodiAbdoul -
Zhihua Yao
@hackyzh
Something went wrong.
Something went wrong.