parad0xr's profile picture. Security @ MPL | Bug Hunter | F1 Enthusiast | Web3 noob | Gamer | My opinions are my own

Siddharth

@parad0xr

Security @ MPL | Bug Hunter | F1 Enthusiast | Web3 noob | Gamer | My opinions are my own

Siddharth reposted

Cut our AWS bill from $52K to $18K per month. Took 3 weeks of detective work. The audit: - Started with AWS Cost Explorer - Noticed NAT Gateway was $8K/month - Data transfer was $12K/month - RDS storage was $6K/month What we found: - Logs were being sent to S3 via NAT Gateway -…


Siddharth reposted

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Siddharth reposted

The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW. The leak originated…

gfw_report's tweet image. The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW.

The leak originated…
gfw_report's tweet image. The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW.

The leak originated…
gfw_report's tweet image. The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW.

The leak originated…

Siddharth reposted

When we decompile an APK and see an unreadable index.android.bundle, it could be Hermes bytecode. Using github.com/P1sec/hermes-d… we can make it readable and look for interesting endpoints, keys, or app flows. #bugbounty


Siddharth reposted

That is actually the real exploit. I went through all the decoding and stuff. It finally is the payload that creates spinstall0.aspx which then gets you the machine keys that allow you to craft your own Viewstates.

theluemmel's tweet image. That is actually the real exploit.
I went through all the decoding and stuff.
It finally is the payload that creates spinstall0.aspx which then gets you the machine keys that allow you to craft your own Viewstates.

sharepoint.payload.txt gist.github.com/gboddin/6374c0…

leak_ix's tweet image. sharepoint.payload.txt
gist.github.com/gboddin/6374c0…


Siddharth reposted

Super easy win for defenders… block everything from LoLRMM lolrmm.io


Siddharth reposted

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN


Siddharth reposted

Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…

cyb3rops's tweet image. Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…
cyb3rops's tweet image. Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…

Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN



Siddharth reposted

This vulnerability not only affects users of PuTTY but also extends to several other tools... Affected Products - PuTTY 0.68 - 0.80 - FileZilla 3.24.1 - 3.66.5 - WinSCP 5.9.5 - 6.3.2 - TortoiseGit 2.4.0.2 - 2.15.0 - TortoiseSVN 1.10.0 - 1.14.6


Siddharth reposted

Vulnerability in Putty: "attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key" * Revoke keys immediately including public in authorized_keys * Generate a new key pair and replace chiark.greenend.org.uk/~sgtatham/putt…


Siddharth reposted

I spent the last 5 months reverse engineering Denuvo's protection in Hogwarts Legacy and finally managed to bypass it using more than 2000 hooks 😂 One of the toughest challenges of my life. Here's my blog post about it: momo5502.com/posts/2024-03-…


Siddharth reposted

The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2023! portswigger.net/research/top-1…


Siddharth reposted

Interesting Thread on a massive dump from a Chinese 🇨🇳 Ministry of Public Security (MPS) private industry contractor called iSoon (aka Anxun) Leak contains: - Spyware - Espionage Ops - “Twitter Monitoring Platform” - And a lot more 🔥 This is a crazy NTC Vulkan-level leak ⚠️

This post is unavailable.

Siddharth reposted

#threatintel someone just leaked a bunch of internal Chinese government documents on GitHub github.com/I-S00N/I-S00N/


Siddharth reposted

I recently came across a weird case of cache deception vulnerability on a @SynackRedTeam target. I'm very excited to share the details with y'all. Also, I'm trying a new blog format this time. I hope you folks like it. Here you go: kuldeep.io/posts/web-cach…


Siddharth reposted

"Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains" #infosec #pentest #redteam inversecos.com/2022/06/guide-…

CyberWarship's tweet image. "Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains"

#infosec #pentest #redteam 
inversecos.com/2022/06/guide-…

Siddharth reposted

im never gonna use etherscan again

bytes032's tweet image. im never gonna use etherscan again

Siddharth reposted

🧊 IceKube: Finding complex attack paths in Kubernetes clusters Bloodhound for Kubernetes Uses Neo4j to store & analyze Kubernetes resource relationships → identify attack paths & security misconfigs Currently has 25 attack techniques By @WithSecure labs.withsecure.com/tools/icekube-…

clintgibler's tweet image. 🧊 IceKube: Finding complex attack paths in Kubernetes clusters

Bloodhound for Kubernetes

Uses Neo4j to store & analyze Kubernetes resource relationships → identify attack paths & security misconfigs

Currently has 25 attack techniques

By @WithSecure

labs.withsecure.com/tools/icekube-…

Loading...

Something went wrong.


Something went wrong.