Octagon Networks (@octagonnetworks) 's Twitter Profile
Octagon Networks

@octagonnetworks

We are a global company made up of hackers and security researchers working together to tackle advanced threats and vulnerabilities.

ID: 1439534375058624513

linkhttps://octagon.net calendar_today19-09-2021 10:18:48

92 Tweet

7,7K Followers

0 Following

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

Solution: 49% of the internet suffer from a 0day CSP bypass because it runs WordPress at a directory or subdomain. Our blog too is WordPress at octagon.net/blog Attackers can utilize a novel CSP bypass technique we discovered to bypass the policy. #bugbountytips

Solution: 49% of the internet suffer from a 0day CSP bypass because it runs WordPress at a directory or subdomain. Our blog too is WordPress at octagon.net/blog 

Attackers can utilize a novel CSP bypass technique we discovered to bypass the policy. #bugbountytips
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

OK, so why does this XSS work? Octagon Networks researchers discovered PHP servers drop any header if the header has "%0D". This means if attacker controls char in header they can remove the header. That is the solution to our latest XSS. The more you know 😉 #bugbountytips

OK, so why does this XSS work?

Octagon Networks researchers discovered PHP servers drop any header if the header has "%0D". This means if attacker controls char in header they can remove the header. That is the solution to our latest XSS. 

The more you know 😉 #bugbountytips
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

You can now bypass CSP on any website that allows github.com in a script-src or default-src PoC: <script src=api.github.com/gist/anything?…></script> Despite character limitations, you can use the Same Origin Method Execution technique we shared to get full XSS.

You can now bypass CSP on any website that allows github.com in a script-src or default-src

PoC: &lt;script src=api.github.com/gist/anything?…&gt;&lt;/script&gt;

Despite character limitations, you can use the Same Origin Method Execution technique we shared to get full XSS.
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

CVE-2023-46251: Stored DOM XSS in MyBB < 1.8.37 by using BBCode 🔥: [size='1337px;\">>\<img/src=ccc/ onerror=alert`1`//id=name //&pt;']eviltext[/size] It gets executed within the textbox preview so any user looking at it or editing it will trigger it. Patch asap! #bugbountytip

CVE-2023-46251: Stored DOM XSS in MyBB &lt; 1.8.37 by using BBCode 🔥:

[size='1337px;\"&gt;&gt;\&lt;img/src=ccc/ onerror=alert`1`//id=name //&amp;pt;']eviltext[/size]

It gets executed within the textbox preview so any user looking at it or editing it will trigger it. Patch asap! #bugbountytip
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

This CSP bypass technique utilizing SOME attack went under the radar but allowed for a novel way to defeat CSP with only A-z,. characters & windows. Another interesting fact of the specific issue is, WordPress remains vulnerable to this day and affects all WordPress sites (49% of

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

You can now bypass CSP on any website that allows https://*.facebook.com in a default or script-src 🔥🌊? PoC: <script src=graph.facebook.com/?id=1337%26cal…></script> Exploitation is only possible using a novel technique we published: octagon.net/blog/2022/05/2… #bugbountytip #BugBounty

You can now bypass CSP on any website that allows https://*.facebook.com in a default or script-src 🔥🌊? 

PoC: &lt;script src=graph.facebook.com/?id=1337%26cal…&gt;&lt;/script&gt;

Exploitation is only possible using a novel technique we published:  

octagon.net/blog/2022/05/2… #bugbountytip #BugBounty
Isira Adithya (@isira_adithya) 's Twitter Profile Photo

Here's a little tip to escalate Client Side Path Traversal (in <script src>) to XSS in wordpress sites; It is possible to use the /wp-json/?_jsonp=<payload> rest-api path to execute arbitrary js functions. Read more at octagon.net/blog/2022/05/2… Credits: Octagon Networks

Here's a little tip to escalate Client Side Path Traversal (in &lt;script src&gt;) to XSS in wordpress sites;

It is possible to use the /wp-json/?_jsonp=&lt;payload&gt; rest-api path to execute arbitrary js functions.

Read more at octagon.net/blog/2022/05/2…
Credits: <a href="/OctagonNetworks/">Octagon Networks</a>
Paulos Yibelo (@paulosyibelo) 's Twitter Profile Photo

Introducing DoubleClickjacking 🧌: a widespread timing-based vulnerability class that slips between your first & second click — evading modern mitigations leading to account takeover vulnerabilities in almost all major websites. paulosyibelo.com/2024/12/double… #bugbountytips #infosec

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

For the last year and a half we have been secretly working on multiple products that will shake and transform cyber security as we know it. From vulnerability detection, source code audit and penetration testing, to bug bounty and offensive security research. Stay tuned! 🤫

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

With little help with @pwndotai , which is an agentic hacking ecosystem we are building, we are able to get 1-click RCE in Cluely (Cluely). The exploit takes time to setup but it's straight forward and can be reached via many techniques, and an indirect prompt injection. The

With little help with @pwndotai , which is an agentic hacking ecosystem we are building, we are able to get 1-click RCE in Cluely (<a href="/cluely/">Cluely</a>). The exploit takes time to setup but it's straight forward and can be reached via many techniques, and an indirect prompt injection. The
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

This is insane! @Pwndotai has autonomously discovered an unauthenticated remote command execution vulnerability affecting over 70,000 servers. It found the entry point, developed the entire chain, created a proof of concept, iterated through the right issues and entirely on its

This is insane! @Pwndotai has autonomously discovered an unauthenticated remote command execution vulnerability affecting over 70,000 servers. It found the entry point, developed the entire chain, created a proof of concept, iterated through the right issues and entirely on its
Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

We hacked Cluely's “Cheat on Everything” tool… and took full control of the cheaters computer. When a cheater uses Cluely, not only are we able to detect they are using Cluely but execute full commands on their computer. ‼️ Watch the full video 👇

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

🚨 Octagon Networks has reproduced an unpatched SharePoint zero-day (CVE-2025-53770) now under active attack. Exploits leak MachineKey secrets, letting attackers hijack __VIEWSTATE for persistent code execution. If your SharePoint is exposed online, assume it’s compromised, take

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

What we are building is insane. If vendors patched quicker, we would've showed you already. The sort of vulnerabilities pwn.ai is finding is on par with the top security researchers. preauth RCE after preauth RCE fully autonomously. Will drop a blog post soon.

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

Looks like nation-state actors are utilizing fully autonomous hacking engines. Wild to see them finally doing what we’ve already built, tested, and pushed way further at pwn.ai. The future of hacking is autonomous!