@aritombino Profile picture

aritombino

@aritombino

Joined August 2019
Similar User
MCKSys Argentina photo

@MCKSysAr

Manuel Iglesias 𓆰𓆪 photo

@maaanuu95

Dolphin photo

@Dolphin01684386

Albert photo

@intthree

ArtsSEC photo

@ArtsSEC

Gab photo

@gabdotsh

reib3n photo

@reib3n1

Alex 🏳️‍🌈 photo

@Alex91dotar

Javier Aguinaga photo

@pastaCLS

Jmz photo

@juli4n_munoz

Daniel Dieser photo

@daletoniris

Aníbal Irrera photo

@airrera

Matias Vazquez photo

@mattsec

Danners photo

@__Danners__

yerba photo

@y3rb1t4

aritombino Reposted

Successfully bypassed a SSRF WAF by using a combination of IPV6 + Unicode. Payload for Metadata instances: http://[::ⓕⓕⓕⓕ:①⑥⑨。②⑤④。⑯⑨。②⑤④]:80 Check images for response difference between 169.254.169.254 and the above payload I shared 🔥 #bugbounty #infosec #waf

Tweet Image 1
Tweet Image 2

aritombino Reposted

I found a SQL on one URL but properly secured. But found @LiveOverflow new video "HTML Sanitizer Bypass Investigation". I give it a try and I was able to bypass Cloudflare which leads to XSS. payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/

Tweet Image 1
Tweet Image 2
Tweet Image 3

aritombino Reposted

Doing #BugBounty again :) Quick write-up about a Critical vuln I found: Exploiting Application-Level Profile Semantics (APLS) from Spring 🧙‍♂️ curl -H 'Accept:application/schema+json' -v http://localhost:8080/alps/profile/users niemand.com.ar/2021/01/08/exp… #BugBountyTips #infosec

Tweet Image 1

aritombino Reposted

New article about how to persist “laterally” reading DPAPI keys. This could be used in a red team project. /cc @CoreSecurity

We know how the Internet feels about #cats: More is better. We're doing our part by showing you how to read #DPAPI keys using #mimikatz: coresecurity.com/core-labs/arti…



aritombino Reposted

Gracias comunidad de Tandil! Un saludo muy grande y un placer haber podido participar.

🔥 ¡Publicamos un nuevo video en nuestro canal de YouTube! 🍻 Diego y @riflon de @CoreSecurity nos estuvieron compartiendo la metodología que usan a la hora de hacer Pentesting y algunas historias de casos reales. ¡Muchas Gracias! 📺 youtu.be/A3Ut_ehMZfA



aritombino Reposted

New Advisory of the SCS Team at #coresecurity coresecurity.com/core-labs/advi… An authenticated OS Command Execution abusing websockets @aritombino


aritombino Reposted

Multiple vulnerabilities in Pandora FMS - New advisory published --> coresecurity.com/core-labs/advi… #CoreSecurity @CoreSecurity


aritombino Reposted

Found an even cooler example with this technique when looking at it quick. When executing with conhost it executes the process without a parent PID. conhost calc.exe/../../windows/notepad.exe Thanks for the inspiring post @julianpentest

Tweet Image 1

This also works really well: cmd.exe /c "gpupdate /force/../../../../../../../../../../windows/notepad.exe" and cmd /c "mshta.exe c:\temp\none.hta/../../../../../../../../../../windows/notepad.exe" Fun stuff to be had with this technique



aritombino Reposted

New XSS stored in Zulip by @aritombino - Advisory here --> coresecurity.com/advisories/zul… #CoreSecurity


aritombino Reposted

Payloads collection:- Command Injection:- github.com/payloadbox/com… XSS Payloads:- github.com/payloadbox/xss… XXE Payload List:- github.com/payloadbox/xxe… SQLI Payload List:- github.com/payloadbox/sql… RFI/LFI :- github.com/payloadbox/rfi… Open Redirect:- github.com/payloadbox/ope…


aritombino Reposted

LM, NTLM, Net-NTLMv2, oh my! A Pentester's Guide to #Windows Hashes medium.com/@petergombos/l…


aritombino Reposted

HTTP Request Smuggling in Apache Traffic Server : regilero.github.io/english/securi… HTTP Smuggling, Jetty : regilero.github.io/english/securi… cc @regilero

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.