#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

drtune's tweet image. Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you came  across SSTI in a go application, it is worth trying the following payload
{{define &quot;T1&quot;}}&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;{{end}} {{template &quot;T1&quot;}}
to achieve XSS and bypass HTML sanitization.
#bugbounty #hackertips #XSS

[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML.

#bugbounty #hackertips

Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. Looking for IDOR but API return 403 forbidden, try to send wildcard as user id &apos;{&quot;id&quot;:&quot;*&quot;}&apos; or use the ID in array &apos;{&quot;id&quot;:[123]}&apos;. #bugbounty #hackertips 
@TnMch_

Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

1o57's tweet image. Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite

YogoshaOfficial's tweet image. [HACKER TIP] Top Burp Suite Extensions:
1- Turbo Intruder
2- J2EEScan
3- Autorize
4- Active Scan++
5- Collaborator Everywhere
6- Param Miner
7- JSON Beautifier
8- Upload Scanner
9- Freddy
10- Logger++
#bugbounty #hackertips #BurpSuite

Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips

YogoshaOfficial's tweet image. Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections.

Exp: HEAD Request to /login username=foo&amp;amp;password=foo

#bugbounty #hackertips

[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing 
EXEC xp_cmdshell &apos;Command Option&apos;;
Thanks @H4MA_TN for the tip 🙏
#bugbounty #hackertips

[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities.
#bugbounty #hackertips #XSS

When compiling tools (like aircrack-ng), it's important to color coordinate with the game you're playing to pass the time. #HackerTips

ktneely's tweet image. When compiling tools (like aircrack-ng), it&apos;s important to color coordinate with the game you&apos;re playing to pass the time.  #HackerTips

#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!

drtune's tweet image. #HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger &amp;amp; &quot;paste txt to app&quot; sound good too. Cheap!

#HackerTips When repurposing a plastic enclosure (in this case a DeWalt case) you often need to remove material. Hot air gun on X-Acto knife amazingly good. Literally "knife through butter". Aim air mostly on blade, partly at oncoming plastic. Super clean!

drtune's tweet image. #HackerTips When repurposing a plastic enclosure (in this case a DeWalt case) you often need to remove material. Hot air gun on X-Acto knife amazingly good. Literally &quot;knife through butter&quot;. Aim air mostly on blade, partly at oncoming plastic. Super clean!

Best practice of the week : Most #bugbounty platforms use Markdown to render the reports. Feel free to include the whole ```http request to help the secteam. #hackertips #incrowdwetrust

YogoshaOfficial's tweet image. Best practice of the week : Most #bugbounty platforms use Markdown to render the reports. Feel free to include the whole ```http request to help the secteam. #hackertips #incrowdwetrust

#HackerTips disc magnets are superb for retaining and organizing screws/nuts etc when tearing down. Arrange in a row and each stage of disassembly or screw type gets own magnet. V secure and delightfully easy to pick one off again. Also, self-generating screw sculptures!

drtune's tweet image. #HackerTips disc magnets are superb for retaining and organizing screws/nuts etc when tearing down. Arrange in a row and each stage of disassembly or screw type gets own magnet. V secure and delightfully easy to pick one off again. Also, self-generating screw sculptures!
drtune's tweet image. #HackerTips disc magnets are superb for retaining and organizing screws/nuts etc when tearing down. Arrange in a row and each stage of disassembly or screw type gets own magnet. V secure and delightfully easy to pick one off again. Also, self-generating screw sculptures!

[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions.

@BelkahlaAhmed1 

#bugbounty #hackertips

Blocked by WAF? use DNS History, find origin ip address of the target by looking for inactive subdomains in the records, CDN or try accessing other services such as ftp.target.com 👉Use suip.biz or bypass-firewalls-by-DNS-history.sh #hackertips @Ging_Freex

YogoshaOfficial's tweet image. Blocked by WAF? use DNS History, find origin ip address of the target by looking for inactive subdomains in the records, CDN or try accessing other services such as ftp.target.com

👉Use suip.biz or bypass-firewalls-by-DNS-history.sh

#hackertips @Ging_Freex

[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect

YogoshaOfficial's tweet image. [HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character.
example:
redirect_to=////evil%E3%80%82com 
#bugbounty #hackertips #openredirect

Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

YogoshaOfficial's tweet image. Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue &amp;gt; jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

14/ Follow me @Hoesenbug for tactical bug bounty breakdowns. More threads like this. Real hacks. Real lessons. #Hoesenbug #HackerTips #BugBounty


Want to learn hacking but ignoring networking? That’s like wanting to be a chef but hating fire.🔥 Start here: – TCP/IP – Ports – OSI Model – Wireshark Don’t skip this. #Networking #HackerTips #TryHackMe #CyberSecurity

SeamSikderNahid's tweet image. Want to learn hacking but ignoring networking?
That’s like wanting to be a chef but hating fire.🔥
Start here:
– TCP/IP
– Ports
– OSI Model
– Wireshark

Don’t skip this.
#Networking #HackerTips #TryHackMe #CyberSecurity

🔓 7 unexpected ways hackers can access your account — and you might not even see them coming. Stay one step ahead! #CyberSecurity #OnlineSafety #HackerTips #ITSupportMelbourne #Cybersecurity #ITSupportforAustralianBusinesses #ITConsultation


Time to pivot our threat modeling and user education strategies 🔐 6/ Protect yourself: Don’t download "fixes" from unverified sources Check URLs closely Use sandboxing for suspicious links Educate non-tech users — they’re the prime targets #CyberAware #HackerTips


Don’t just scan with Nmap. Use flags! 𝚗𝚖𝚊𝚙 -𝙰 -𝚃𝟺 𝚝𝚊𝚛𝚐𝚎𝚝.𝚌𝚘𝚖 gives OS, services, and scripts. #KaliLinux #Nmap #HackerTips #kalilinuxin #bugbountytips


Elevate your security game! Combining a strong username & password with multi-factor authentication is your best defense against cyber threats. Stay one step ahead—secure access, guaranteed. 💻📱 #Cybersecurity #HackerTips #StaySecure"

Harri_Devalle__'s tweet image. Elevate your security game! Combining a strong username &amp;amp; password with multi-factor authentication is your best defense against cyber threats. Stay one step ahead—secure access, guaranteed. 💻📱 #Cybersecurity #HackerTips #StaySecure&quot;

9/11 For top cybersecurity tips and news on how to protect your digital space, follow @Eth1calHackrZ. Let’s stay ahead of the game and secure our future online! 🔒🌐 #CyberSecurity #DigitalProtection #HackerTips #StaySafeOnline


10. Join Travel Hacking Communities 🤝 - Learn from other travel hackers and stay updated on the latest deals and strategies. 📚💡 #TravelCommunity #HackerTips


Social engineering: the human element of hacking. Never underestimate its power. #HackerTips #CyberSecurity


#HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy
drtune's tweet image. #HackerTips Always 5 minutes well spent; macro shot of PCB and overlay pinout from datasheet as adjustable transparency layer (invert, tweak contrast/color). AR vision would/will be nice (and I keep thinking about it) but this is damn handy

[HACKER TIP] If you came across SSTI in a go application, it is worth trying the following payload {{define "T1"}}<script>alert(1)</script>{{end}} {{template "T1"}} to achieve XSS and bypass HTML sanitization. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you came  across SSTI in a go application, it is worth trying the following payload
{{define &quot;T1&quot;}}&amp;lt;script&amp;gt;alert(1)&amp;lt;/script&amp;gt;{{end}} {{template &quot;T1&quot;}}
to achieve XSS and bypass HTML sanitization.
#bugbounty #hackertips #XSS

[HACKER TIP] Top Burp Suite Extensions: 1- Turbo Intruder 2- J2EEScan 3- Autorize 4- Active Scan++ 5- Collaborator Everywhere 6- Param Miner 7- JSON Beautifier 8- Upload Scanner 9- Freddy 10- Logger++ #bugbounty #hackertips #BurpSuite

YogoshaOfficial's tweet image. [HACKER TIP] Top Burp Suite Extensions:
1- Turbo Intruder
2- J2EEScan
3- Autorize
4- Active Scan++
5- Collaborator Everywhere
6- Param Miner
7- JSON Beautifier
8- Upload Scanner
9- Freddy
10- Logger++
#bugbounty #hackertips #BurpSuite

Looking for IDOR but API return 403 forbidden, try to send wildcard as user id '{"id":"*"}' or use the ID in array '{"id":[123]}'. #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. Looking for IDOR but API return 403 forbidden, try to send wildcard as user id &apos;{&quot;id&quot;:&quot;*&quot;}&apos; or use the ID in array &apos;{&quot;id&quot;:[123]}&apos;. #bugbounty #hackertips 
@TnMch_

Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what's in there well enough for it to be a useful resource at times.

drtune's tweet image. Silly #HackerTips - you know those spare SMD parts you pull off boards? Micro SD holders! You can see what&apos;s in there well enough for it to be a useful resource at times.

[HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities. #bugbounty #hackertips #XSS

YogoshaOfficial's tweet image. [HACKER TIP] If you are trying to do an SSRF with XXE but some XML entities are blocked, you can try using XML parameter entities.
#bugbounty #hackertips #XSS

Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips

YogoshaOfficial's tweet image. Have you every wondered which sections to put in your reports? Check out our best practice of the week by @gwendallecoguic 👇 #incrowdwetrust #bugbounty #hackertips

[HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML. #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you ever find LibreOffice is being used for file conversion there is a potential SSRF that you can exploit by injecting your payload in the XML.

#bugbounty #hackertips

Best practice of the week : remember that duplicates can be paid when you provide more details than the original report ! #hackertips #bugbounty #incrowdwetrust

YogoshaOfficial's tweet image. Best practice of the week : remember that duplicates can be paid when you provide more details than the original report ! #hackertips #bugbounty #incrowdwetrust

[HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing EXEC xp_cmdshell 'Command Option'; Thanks @H4MA_TN for the tip 🙏 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] If you got an SQL injection in MSSQL you can elevate the severity of the bug by getting an RCE By enabling xp_cmdshell and then you can execute commands by typing 
EXEC xp_cmdshell &apos;Command Option&apos;;
Thanks @H4MA_TN for the tip 🙏
#bugbounty #hackertips

Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

1o57's tweet image. Hacker tip: the tiny soy sauce sushi plates are perfect for holding screws and small parts when doing a hardware hack or modification #HackerTips

Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections. Exp: HEAD Request to /login username=foo&password=foo #bugbounty #hackertips

YogoshaOfficial's tweet image. Finding a hard time to achieve CSRF ? Try using HEAD requests with POST data passed as GET parameters to bypass some protections.

Exp: HEAD Request to /login username=foo&amp;amp;password=foo

#bugbounty #hackertips

Best practice of the week : Most #bugbounty platforms use Markdown to render the reports. Feel free to include the whole ```http request to help the secteam. #hackertips #incrowdwetrust

YogoshaOfficial's tweet image. Best practice of the week : Most #bugbounty platforms use Markdown to render the reports. Feel free to include the whole ```http request to help the secteam. #hackertips #incrowdwetrust

[HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions. @BelkahlaAhmed1 #bugbounty #hackertips

YogoshaOfficial's tweet image. [HACKER TIP] Make sure to always add these headers X-Originating-IP,X-Forwarded-FoR,X-Remote-IP,X-Remote-Addr,X-Client-IP,X-Host,X-Forwarded-Host to your requests with some internal IPs . You may end up bypassing some restrictions.

@BelkahlaAhmed1 

#bugbounty #hackertips

if you find “403 Forbidden” while accessing a specific path, try using ";" which can lead to bypassing the restrictions. Exp : site.com/admin;/ #bugbounty #hackertips @TnMch_

YogoshaOfficial's tweet image. if you find “403 Forbidden” while accessing a specific path, try using &quot;;&quot; which can lead to bypassing the restrictions.
Exp : site.com/admin;/
#bugbounty #hackertips
@TnMch_

Blocked by WAF? use DNS History, find origin ip address of the target by looking for inactive subdomains in the records, CDN or try accessing other services such as ftp.target.com 👉Use suip.biz or bypass-firewalls-by-DNS-history.sh #hackertips @Ging_Freex

YogoshaOfficial's tweet image. Blocked by WAF? use DNS History, find origin ip address of the target by looking for inactive subdomains in the records, CDN or try accessing other services such as ftp.target.com

👉Use suip.biz or bypass-firewalls-by-DNS-history.sh

#hackertips @Ging_Freex

[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect

YogoshaOfficial's tweet image. [HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character.
example:
redirect_to=////evil%E3%80%82com 
#bugbounty #hackertips #openredirect

Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue > jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

YogoshaOfficial's tweet image. Bug bounty tips : user enumeration, internal IP disclosure, full path disclosure are not so dangerous by themselves but if you combine them with another issue &amp;gt; jackpot ! 🤑 #hackertips #incrowdwetrust #bugbounty

#HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger & "paste txt to app" sound good too. Cheap!

drtune's tweet image. #HackerTips - I suspected this would be awesome and not disappointed; $3 footswitch plus three croc clips (normally open/closed). SO HANDY for power cycling board, hitting reset, triggering scope, etc when hands full. Camera trigger &amp;amp; &quot;paste txt to app&quot; sound good too. Cheap!

When compiling tools (like aircrack-ng), it's important to color coordinate with the game you're playing to pass the time. #HackerTips

ktneely's tweet image. When compiling tools (like aircrack-ng), it&apos;s important to color coordinate with the game you&apos;re playing to pass the time.  #HackerTips

Loading...

Something went wrong.


Something went wrong.


United States Trends