chivato(@SecGus) 's Twitter Profileg
chivato

@SecGus

hacker

ID:3181191826

linkhttp://hackerone.com/chiv calendar_today18-04-2015 22:47:21

3,1K Tweets

5,2K Followers

810 Following

chivato(@SecGus) 's Twitter Profile Photo

Mass disclosure leaking tax documents that include everything under the sun (including passport numbers and drivers licenses) set to High from Critical by H1 triage. Whatโ€™s the point in the platform standards if they get ignored anyway?

docs.hackerone.com/en/articles/83โ€ฆ

account_circle
ProjectDiscovery.io(@pdiscoveryio) 's Twitter Profile Photo

๐Ÿ’ก Scanning for vulnerabilities should be a communal effort

Security can't be hidden behind a paywall, it needs to be something anyone can implement.

account_circle
chivato(@SecGus) 's Twitter Profile Photo

Found an old site which most likely has a bunch of vulnerabilities, but at registration, the captcha breaks showing: 'ERROR for site owner: Invalid domain for site key'. Does anyone know of a trick to bypass this? Or a way to get the correct key? Maybe a match and replace trick?

account_circle
chivato(@SecGus) 's Twitter Profile Photo

Does anyone have a good way to get all URLs returned from a dork? I've tried a couple github tools but they are quite unreliable.

account_circle
chivato(@SecGus) 's Twitter Profile Photo

Burp has been giving me so many issues recently. The suggestion box for the search stays open even after closing the search. It just stops intercepting traffic for hosts added with the advanced scoping halfway through a project.

Should've appreciated how nice it worked before...

account_circle
chivato(@SecGus) 's Twitter Profile Photo

I'm still looking for an F5 bypass for XSS, in both reflected and URI forms. If either of these are found multiple reports can be submitted.

Please save me from having to submit these as HTML injections $

account_circle
chivato(@SecGus) 's Twitter Profile Photo

If you find a SQLi and need a sandbox to play with some queries, instead of a local install, try sqlfiddle.com.

I wish I found this sooner.

account_circle
chivato(@SecGus) 's Twitter Profile Photo

Any good SSRF hackers for an escalation? Payload must start with โ€œ//โ€œ and HTTP outbound is blocked. Tried finding internal IPs and hosts to no avail. Should be full read SSRF if I can find a host to prove it.

account_circle