Alex Olsen (@appsecexp) 's Twitter Profile
Alex Olsen

@appsecexp

Cyber Security | Penetration Testing | AppSec | Content Creator | Caffeine & Code.

ID: 1693900946382696448

linkhttps://linktr.ee/appsecexplained calendar_today22-08-2023 08:20:46

104 Tweet

1,1K Followers

149 Following

TCM Security (@tcmsecurity) 's Twitter Profile Photo

Do you find networking overwhelming? You’re not alone - it’s a skill that doesn’t come easy to everyone. But knowing how to network effectively can pay off well, especially when you attend major conferences like #DEFCON. Here are some tips from Alex Olsen to get you started!

Do you find networking overwhelming? You’re not alone - it’s a skill that doesn’t come easy to everyone. But knowing how to network effectively can pay off well, especially when you attend major conferences like #DEFCON. Here are some tips from <a href="/appSecExp/">Alex Olsen</a> to get you started!
TCM Security (@tcmsecurity) 's Twitter Profile Photo

In today’s video, Alex Olsen talks to Andrew Prince, Joe Hudson, Angela Brown, & Andrew Bellini about how to fail a cybersecurity job interview (and how to avoid doing just that). 😱 Got #interview stories? Share them with us! youtu.be/nk9L66KwZXw

In today’s video, <a href="/appSecExp/">Alex Olsen</a> talks to Andrew Prince, Joe Hudson, Angela Brown, &amp; Andrew Bellini about how to fail a cybersecurity job interview (and how to avoid doing just that). 😱  

Got #interview stories? Share them with us! youtu.be/nk9L66KwZXw
Web Security Academy (@websecacademy) 's Twitter Profile Photo

🚨 Uncover hidden vulnerabilities with our URL Validation Bypass Cheat Sheet 👾 The URL Validation Bypass Cheat Sheet helps you address SSRF, CORS misconfiguration and open redirection - save the Cheat Sheet below: portswigger.net/web-security/s…

TCM Security (@tcmsecurity) 's Twitter Profile Photo

Join Alex Olsen today for a lightning-fast dive into regex! Understanding Regular Expressions (regex) is essential for any cybersecurity professional. Whether you're analyzing log files, bypassing flawed filters, or automating tedious tasks, learning #regex can help you: ✔️

Join <a href="/appSecExp/">Alex Olsen</a> today for a lightning-fast dive into regex! Understanding Regular Expressions (regex) is essential for any cybersecurity professional. Whether you're analyzing log files, bypassing flawed filters, or automating tedious tasks, learning #regex can help you:

✔️
Caido (@caidoio) 's Twitter Profile Photo

Missed our workshop at Hackfest? The full presentation and the exercises are available on Github 💪 We go in depth about Workflows, Plugins and the GraphQL API 👀 github.com/caido/workshop…

Missed our workshop at Hackfest? The full presentation and the exercises are  available on Github 💪 
We go in depth about Workflows, Plugins and the GraphQL API 👀 
github.com/caido/workshop…
TCM Security (@tcmsecurity) 's Twitter Profile Photo

Prototype pollution is a JavaScript vulnerability that can lead to serious security issues like XSS, arbitrary code execution, denial of service, and even bypassing security controls. It occurs when we manipulate the prototype of an object, allowing attackers to inject or modify

Prototype pollution is a JavaScript vulnerability that can lead to serious security issues like XSS, arbitrary code execution, denial of service, and even bypassing security controls. It occurs when we manipulate the prototype of an object, allowing attackers to inject or modify
TCM Security (@tcmsecurity) 's Twitter Profile Photo

In our latest video, we’re diving deep into Keeper Connection Manager and Keeper Vault—two essential features for securing secrets and managing connections. Whether you're an individual or part of a team, Keeper’s flexibility and features make it easy to set up and even easier to

In our latest video, we’re diving deep into Keeper Connection Manager and Keeper Vault—two essential features for securing secrets and managing connections. Whether you're an individual or part of a team, Keeper’s flexibility and features make it easy to set up and even easier to
TCM Security (@tcmsecurity) 's Twitter Profile Photo

A new Advanced Web Hacking module appears! The course adds Module #2 GraphQL this Wednesday. An early holiday gift from our team to you - happy hacking <3 tcm.rocks/awh-x Like this course so far? 🤔 Consider checking out the PWPP (previously the PWPT), the Practical Web

A new Advanced Web Hacking module appears! The course adds Module #2 GraphQL this Wednesday. An early holiday gift from our team to you - happy hacking &lt;3

tcm.rocks/awh-x

Like this course so far? 🤔 Consider checking out the PWPP (previously the PWPT), the Practical Web
TCM Security (@tcmsecurity) 's Twitter Profile Photo

Have you explored the new modules in the Advanced Web Hacking course by Alex Olsen yet? So far, we’ve released Prototype Pollution and GraphQL—let us know your thoughts and experiences in the comments below! 🔥 Next module drops in January 2025! TL;DR of the released

Have you explored the new modules in the Advanced Web Hacking course by <a href="/appSecExp/">Alex Olsen</a> yet? So far, we’ve released Prototype Pollution and GraphQL—let us know your thoughts and experiences in the comments below!   

🔥 Next module drops in January 2025!  TL;DR of the released
TCM Security (@tcmsecurity) 's Twitter Profile Photo

Have you heard of Cookie Jar Overflows? This classic yet under-discussed technique allows attackers to remove cookies from a target user and replace them with their own. Combined with vulnerabilities like session fixation, it can have serious impacts, including account takeovers.

Have you heard of Cookie Jar Overflows? This classic yet under-discussed technique allows attackers to remove cookies from a target user and replace them with their own. Combined with vulnerabilities like session fixation, it can have serious impacts, including account takeovers.
TCM Security (@tcmsecurity) 's Twitter Profile Photo

Roses are red, violets are blue. We have a new cert coming out in the next few weeks - what is it, do you have a clue? 💝 See our existing (and well-loved) certifications here! tcm.rocks/certs-x

Roses are red, violets are blue. We have a new cert coming out in the next few weeks - what is it, do you have a clue? 💝

See our existing (and well-loved) certifications here! tcm.rocks/certs-x
TCM Security (@tcmsecurity) 's Twitter Profile Photo

Cybersecurity professionals face constant stress, high expectations, and endless demands. This is a toxic mix that can lead to burnout. But burnout isn’t simply about feeling stressed or overworked; it's a chronic condition that can leave you feeling drained, disengaged, and

Cybersecurity professionals face constant stress, high expectations, and endless demands. This is a toxic mix that can lead to burnout. But burnout isn’t simply about feeling stressed or overworked; it's a chronic condition that can leave you feeling drained, disengaged, and
Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Developers, tired of DOM XSS in your web applications? 😩 We were too. See how we refactored our code to solve Trusted Types violations in Gmail & AppSheet. Your guide to a safer web is here! bughunters.google.com/blog/585078655…

TCM Security (@tcmsecurity) 's Twitter Profile Photo

𝗪𝗮𝗻𝘁 𝗮 𝗺𝗼𝗿𝗲 𝘀𝗲𝗰𝘂𝗿𝗲 𝗪𝗼𝗿𝗱𝗣𝗿𝗲𝘀𝘀 𝘀𝗶𝘁𝗲? Alex's got you! Today we are covering something different: How to build a secure WordPress site. A few of you have asked about this, and we hope this video helps! Discover how to keep things up to date with hardening

𝗪𝗮𝗻𝘁 𝗮 𝗺𝗼𝗿𝗲 𝘀𝗲𝗰𝘂𝗿𝗲 𝗪𝗼𝗿𝗱𝗣𝗿𝗲𝘀𝘀 𝘀𝗶𝘁𝗲? Alex's got you! Today we are covering something different: How to build a secure WordPress site. A few of you have asked about this, and we hope this video helps! Discover how to keep things up to date with hardening
0x45 (@0x45o) 's Twitter Profile Photo

If you are bored you can always: - Build your own operating system - Build your own game engine - Build your database - Build your compiler - Build your virtual machine - Build your web server

TCM Security (@tcmsecurity) 's Twitter Profile Photo

Alex (Alex Olsen) is in Portugal as part of the "Hack the Planet" series from Matosinhos.tech, taking the conversation from livestream to real life! He'll be tackling AI & Web App pentesting at this event. We're very proud when TCM Security members step into the

Alex (<a href="/appSecExp/">Alex Olsen</a>) is in Portugal as part of the "Hack the Planet" series from Matosinhos.tech, taking the conversation from livestream to real life! He'll be tackling AI &amp; Web App pentesting at this event.

We're very proud when TCM Security members step into the
TCM Security (@tcmsecurity) 's Twitter Profile Photo

𝗣𝗶𝗰𝘁𝘂𝗿𝗲 𝘁𝗵𝗶𝘀: You’re installing a popular #JavaScript library. Shortly after installation, you discover it has been stealing your secrets, mining crypto, or opening a backdoor on your machine.  This is just how supply chain attacks often unfold in the Node.js

𝗣𝗶𝗰𝘁𝘂𝗿𝗲 𝘁𝗵𝗶𝘀: You’re installing a popular #JavaScript library. Shortly after installation, you discover it has been stealing your secrets, mining crypto, or opening a backdoor on your machine. 

This is just how supply chain attacks often unfold in the Node.js