Similar User
Graphistry photo

@Graphistry

Atilla Sade photo

@atillasade

☠ Ragnar ☠ photo

@gbergel

Ethical Hacker photo

@offethhacker

Cooper photo

@Ministraitor

Ring3API 🇺🇦 photo

@ntlmrelay

Miguel Santareno photo

@MiguelSantareno

Maurice Daly [MVP] photo

@modaly_it

Volkan Özçelik 🦌 photo

@vadidekivolkan

Limor Kessem, CISM, CCISO photo

@iCyberFighter

Kayhan Kayıhan photo

@kayhankayihan

Yestin photo

@yestinj

Mathias R. Jessen photo

@IISResetMe

Francisco Dominguez photo

@FSDominguez

Nord Reposted

Grow your best employees or lose them, a 🧵 (1/10)


Nord Reposted

VMware fixed CVE-2021-21975 and CVE-2021-21983, which when chained together lead to an unauth RCE in vRealize Operations. The vulnerabilities were found by our researcher Egor Dimitrenko. Advisory: vmware.com/security/advis…

Tweet Image 1

Nord Reposted

Interesting thread on DPRK actors socially engineering security folks, worth a read if you’re in the industry:


Nord Reposted

Normally my approach would be to list the objects in an OU, parse offline for SPN attrib to avoid SPN ldap filter, validate the accounts for honey by checking stuff like last logon, pwdlastset etc, cherry pick the privileged ones of interest then roast 1 w/ aes every 6h


Nord Reposted

There seems to be quite some questions and confusion about the impact of exploiting Zerologon (CVE-2020-1472) on the environment. So here's a thread 👇


Nord Reposted

Since there are already public POCs out there now, here is mine: github.com/dirkjanm/CVE-2… Requires latest impacket version from GitHub!


Nord Reposted

How I Hacked Facebook Again! Unauthenticated RCE on MobileIron MDM (slides inside) blog.orange.tw/2020/09/how-i-… #HITCON


Nord Reposted

Did you ever want to build your own Invoke-Mimikatz not flagged by AMSI? Just published part II of "Bypass AMSI by manual modification" 🤘🥳 s3cur3th1ssh1t.github.io/Bypass-AMSI-by…


Nord Reposted

AWAE content developer @dejandayoff discovered and reported an authentication bypass vulnerability in Wekan. Check out the walkthrough: offs.ec/2R8ockW

Tweet Image 1

Nord Reposted

We have an announcement about our Cracking the Perimeter course. CTP will be retired this year, with the last date for purchase being October 15, 2020. Please read our update for info about what's happening and why: offs.ec/2FmmD01

Tweet Image 1

Nord Reposted

if you are starting with XXE/SSRF bugs, take a look at this awesome write up -> honoki.net/2018/12/12/fro… by the great @honoki 🙌💥🙏👏🧙‍♂️#bugbounty #infosec


Nord Reposted

Soon after this tweet, the CEO of Zoom @ericsyuan reached out and offered me an internship. Excited to announce that I'll be joining Zoom's security team for the summer.

I reverse engineered Zoom to figure out why it was considering UNC paths a URL in the first place. Zoom uses Microsoft's RichEdit interface to process chat messages. Although Zoom allows only http: and https:, Microsoft hardcoded a check for UNC paths.

Tweet Image 1


Nord Reposted

Posted Same Same But Different: Discovering SQL Injections Incrementally with Isomorphic SQL Statements. My approach to discovering SQL Injections in an age of ORMs :) write.as/spaceraccoon/s…


Nord Reposted

A deep dive into disable_functions bypasses and PHP exploitation blackarrow.net/disable-functi…


Nord Reposted

“Hiç bir zaman çok hızlı büyümek istemedik. Felsefemiz mevcut müşterilerimizi memnun etmek. Her zaman mevcut müşterilerimizden gelen istekleri önceliklendiriyoruz ve biliyoruz ki mevcut müşterilerimizi memnun etmediğimiz sürece yenilerini kazanmak sürdürülebilir değil”


Nord Reposted

Facebook OAuth Vulnerability. $55,000 Bounty Awarded by Facebook. Writeup: amolbaikar.com/facebook-oauth… #Facebook #Security #BugBounty


Nord Reposted

Ayyeee Something very similar to this geekboy.ninja/blog/airbnb-bu…


Nord Reposted

Another interesting "from #xss to #rce" writeup s0md3v.github.io/xss-to-rce/ #pentesting


Nord Reposted

What are some endpoints that make you excited when it pops up while performing a directory brute force? Here are some of mine: /api/proxy /swagger-ui /demo /metrics


Loading...

Something went wrong.


Something went wrong.