@barracud4_ Profile picture

barracuda_

@barracud4_

Joined September 2014
Similar User
Cosmin photo

@inhibitor181

Gwendal Le Coguic photo

@gwendallecoguic

H̷͙̰͕̼̫̥͔̮͓͈͉̩͇̯̍̄̍́͊̋̓͜_̸̭̤̻̫͚̗͒̀́̊͆͜D̷̛̈́̏̓̈̒̈͂̚͝ photo

@hd_421

Sergey Belov photo

@sergeybelove

Denis Kolegov photo

@dnkolegov

barracuda_ Reposted

So, you can upload a file to the web app.. Bonus! Repo with slightly old exploits for image upload: github.com/barrracud4/ima… XMind source: github.com/hackerscrolls/… Thanks to hacktricks and @HolyBugx for new tricks (at least for us) book.hacktricks.xyz/pentesting-web…

Tweet Image 1

My File Upload Checklist, detailed version of @hunter0x7 checklist, and also some extra methods I personally use and gathered during the time. #BugBounty #BugBountyTip #BugBountyTips #TogetherWeHitHarder #InfoSec

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


barracuda_ Reposted

Found a hidden HTTP param? Look deeper, maybe there is a mass assignment/autobinding vulnerability. Sometimes changes in objects are hidden too and you need to closely explore the app. Source: itzone.com.vn/en/article/mas… #CyberSecurity #BugBountyTip #BugBounty

Tweet Image 1

barracuda_ Reposted

Looking for a stable reverse proxy for pivoting? Check frp! Useful when you've hacked a server and want to establish a channel to the internal network. A lot of options for pivoting, multiplatform and easy to use. github.com/fatedier/frp #CyberSecurity #Pentest #RedTeam

Tweet Image 1

barracuda_ Reposted

We often get confused how Samesite affects cookies in different attacks in modern browsers. So, we have made a memo and now share it with you. #CyberSecurity #BugBountyTip #BugBounty

Tweet Image 1

barracuda_ Reposted

We have combined all the tricks we know about SSRF into a single mindmap. If we missed something, write about it in the comments! High resolution: raw.githubusercontent.com/hackerscrolls/… XMind source: github.com/hackerscrolls/… #CyberSecurity #BugBountyTip #BugBounty

Tweet Image 1

barracuda_ Reposted

Incredible mindmap about hacking iOS applications by @hd_421 Pay attention, we have prepared two versions: 1. Full Security Assessments 2. Shorter BugBounty version XMind source: github.com/hackerscrolls/… #CyberSecurity #BugBountyTip #BugBounty #iOS

Tweet Image 1

barracuda_ Reposted

We continue to talk about attacks on CORS. This time, we have prepared a set of ideas for bypassing lists of allowed hosts. #CyberSecurity #BugBountyTip #BugBounty

Tweet Image 1

barracuda_ Reposted

There is a popular opinion: bad CORS like <Access-Control-Allow-Origin: *> is unexploitable. Browser won't send cookies in this case. It is a delusion. You can exploit it with a Chrome cache feature! For example: hackerone.com/reports/761726 #BugBountyTip #CyberSecurity #BugBounty

Tweet Image 1

barracuda_ Reposted

Next up on #HITBLockdown002 Track 1: "The Weakest Element of Acquiring Bank Infrastructure" Presented by Ilia Bulatov & Gleb Cherbov Starts 17:00 SGT at youtu.be/Yp7W4hiLpJY Ask questions via our Slido channel #askinthebox

Tweet Image 1
Tweet Image 2
Tweet Image 3

barracuda_ Reposted

Last time we showed you how to use encodings in <a>. Now we've made a scheme what symbols in which points you can inject to bypass WAF, filters, sanitizers. gist.github.com/hackerscrolls/… #BugBounty #CyberSecurity #BugBountyTip

Tweet Image 1

barracuda_ Reposted

Sometimes you can control the href value in HTML tag<a>. So it's a good place for XSS payload! We've created a scheme how to use various encodings in href to bypass filters. gist.github.com/hackerscrolls/… @XssPayloads #BugBountyTip #Bypass

Tweet Image 1

barracuda_ Reposted

You asked for something about OAuth — we did. Here is a mindmap about hacking OAuth 2.0. We tried to cover all possible ways even with low impact. Our inspiration was homakov.blogspot.com/search?q=oauth Thanks to @homakov for outstanding articles. #BugBountyTip #CyberSecurity #BugBounty

Tweet Image 1

barracuda_ Reposted

Faced with CSRF protection? Try to bypass it! Save these 6 common CSRF bypasses that we use too. #BugBountyTip

Tweet Image 1

barracuda_ Reposted

SSRF + CRLF + HTTP Pipeline + Docker API = RCE… How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber link.medium.com/dSWQ6ewPL6


barracuda_ Reposted

Sometimes there is no time to install/configure a fully functioning server. Here are 6 simple servers which can be used during pentest. Catch SSRF callbacks and exploit OOB attacks! Check the replies, there are commands to install and run them. #BugBountyTip #Pentest 1/7

Tweet Image 1

barracuda_ Reposted

We have prepared a mindmap for you with 16 ways how to perfom 2FA security testing. It is based on our practical experience and articles by @0xw2w and @ahack_ru bit.ly/2T95RWU blog.deteact.com/common-flaws-o… #BugBountyTip #TogetherWeHitHarder

Tweet Image 1

barracuda_ Reposted

Sometimes restrictions on "/admin" page can be easily bypassed. You should always check this simple tricks for easy win! #BugBountyTip #BugBounty #YourNextBugTip

Tweet Image 1

barracuda_ Reposted

WebArchive greatly expands your knowledge about the target. WayBackUrls is an awesome tool written by @TomNomNom It fetches all the URLs from WebArchive for a domain and it's subdomains. github.com/tomnomnom/wayb… #BugBountyTip

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.