@0xKonqi Profile picture

Vahagn Israelian 🇦🇲

@0xKonqi

Application Security | Synack Red Team

Similar User
mohammed eldeeb photo

@malcolmx0x

Uranium238 photo

@uraniumhacker

Mahmoud Gamal photo

@Zombiehelp54

streaak photo

@streaak

nikhil(niks) photo

@niksthehacker

pwnmachine photo

@princechaddha

Parth Malhotra photo

@Parth_Malhotra

Sergey Bobrov photo

@Black2Fan

Wh11teW0lf photo

@Wh11teW0lf

Paresh photo

@Paresh_parmar1

Yogendra Jaiswal photo

@vulnh0lic

jackds photo

@jackds1986

harisec photo

@har1sec

Rakesh Mane photo

@RakeshMane10

Karel Origin photo

@Karel_Origin

Heading to the airport on a Georgian bus. Free wi-fi & default router credentials are included 😏 #wifi #defaultcredentials

Tweet Image 1

Fresh one. Leakage of payment gateway API credentials through Access Control Violation in GraphQL. #hacking #pentest #bugbounty #vapt #hackerone #owasp

Tweet Image 1

Yay, I was awarded a $500 bounty on @Hacker0x01! hackerone.com/konqi #TogetherWeHitHarder Kinda back to H1. next step is to get clear badge


New Ivanti XXE seems promising (CVE-2024-22024) #pentest #bugbounty #synack #hackerone #ivanti

Tweet Image 1

Atlassian Confluence Remote Code Execution through OGNL Injection. CVE-2023-22527 #atlassian #bugbounty #hacking #pentest #confluence

Tweet Image 1

Apache Struts 2 OGNL Injection (CVE-2013-2251) leading to Remote Code Execution. Found this one today during a Pentest. #bugbounty #hacking #pentest #struts #burpsuite

Tweet Image 1

Just found GraphQL broken access control leading to administrator credentials disclosure. Here's how to avoid: 1) Implement Proper Authentication & Authorization mechanisms 2) Disable Introspection & field suggestion if API is not for public use #pentest #bugbounty #hacking

Tweet Image 1

Vahagn Israelian 🇦🇲 Reposted

Found my tweet from 2017

I always used to joke that if there was an RCE in Log4J all hell might break lose. Yikes ! cve.mitre.org/cgi-bin/cvenam…



Vahagn Israelian 🇦🇲 Reposted

➡️Default creds for #redteam Cisco: cisco:cisco Citrix: nsroot:nsroot Dell iDRAC: root:calvin Juniper: super:juniper123 pfSense: admin:pfsense SAP: SAP*:06071992 Tomcat: tomcat:tomcat UniFi: ubnt:ubnt Weblogic: weblogic:weblogic1 Zabbix: Admin:zabbix #ptswarmTechniques

Tweet Image 1

Leveled up to 0x05! https://t.co/HhU3df2THI через @SynackRedTeam #BugBounty #Synack

Tweet Image 1

Just got my swag pack from @SynackRedTeam for participation in Hacker Hangout Europe! #bugbounty #Synack

Tweet Image 1

Check out Easy Hack manual from @ptswarm #pentest #bugbounty

💥Easy RCE Ports Java RMI: 1090,1098,1099,4444,11099,47001,47002,10999 WebLogic: 7000-7004,8000-8003,9000-9003,9503,7070,7071 JDWP: 45000,45001 JMX: 8686,9012,50500 GlassFish: 4848 jBoss: 11111,4444,4445 Cisco Smart Install: 4786 HP Data Protector: 5555,5556 #ptswarmTechniques

Tweet Image 1


Vahagn Israelian 🇦🇲 Reposted

The story how I found RCE in Citrix (CVE-2019-19781)

Read this article about CVE-2019-19781 RCE in Citrix by its author, Mikhail Klyuchnikov: swarm.ptsecurity.com/remote-code-ex…

Tweet Image 1


Vahagn Israelian 🇦🇲 Reposted

The results are in...congrats to our #HackerHangout Europe winner, Ozgur - @ozgur_bbh 🏆! And extra shout outs to our top SRT runner(s) up: 2. Konqi - @0xKonqi 3. MrTuxRacer - @MrTuxracer 4. Papyrus - @A_Burak_Gokalp 5. s0rtega - @s_0rtega


Loading...

Something went wrong.


Something went wrong.