barracuda_ (@barracud4_) 's Twitter Profile
barracuda_

@barracud4_

ID: 2810046014

calendar_today14-09-2014 19:54:22

45 Tweet

157 Followers

130 Following

Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

WebArchive greatly expands your knowledge about the target. WayBackUrls is an awesome tool written by TomNomNom. It fetches all the URLs from WebArchive for a domain and it's subdomains. github.com/tomnomnom/wayb… #BugBountyTip

WebArchive greatly expands your knowledge about the target.

WayBackUrls is an awesome tool written by <a href="/TomNomNom/">TomNomNom</a>. It fetches all the URLs from WebArchive for a domain and it's subdomains.

github.com/tomnomnom/wayb…

#BugBountyTip
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Sometimes restrictions on "/admin" page can be easily bypassed. You should always check this simple tricks for easy win! #BugBountyTip #BugBounty #YourNextBugTip

Sometimes restrictions on "/admin" page can be easily bypassed. 

You should always check this simple tricks for easy win!

#BugBountyTip #BugBounty #YourNextBugTip
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

We have prepared a mindmap for you with 16 ways how to perfom 2FA security testing. It is based on our practical experience and articles by Max Yaremchuk and @ahack_ru. bit.ly/2T95RWU blog.deteact.com/common-flaws-o… #BugBountyTip #TogetherWeHitHarder

We have prepared a mindmap for you with 16 ways how to perfom 2FA security testing.

It is based on our practical experience and articles by <a href="/0xw2w/">Max Yaremchuk</a> and @ahack_ru.

bit.ly/2T95RWU
blog.deteact.com/common-flaws-o…

#BugBountyTip #TogetherWeHitHarder
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Sometimes there is no time to install/configure a fully functioning server. Here are 6 simple servers which can be used during pentest. Catch SSRF callbacks and exploit OOB attacks! Check the replies, there are commands to install and run them. #BugBountyTip #Pentest 1/7

Sometimes there is no time to install/configure a fully functioning server. Here are 6 simple servers which can be used during pentest.

Catch SSRF callbacks and exploit OOB attacks!

Check the replies, there are commands to install and run them.

#BugBountyTip #Pentest
1/7
Andrei Abakumov (@andrewaeva) 's Twitter Profile Photo

SSRF + CRLF + HTTP Pipeline + Docker API = RCE… How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber link.medium.com/dSWQ6ewPL6

Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

You asked for something about OAuth — we did. Here is a mindmap about hacking OAuth 2.0. We tried to cover all possible ways even with low impact. Our inspiration was homakov.blogspot.com/search?q=oauth Thanks to Egor Homakov for outstanding articles. #BugBountyTip #CyberSecurity #BugBounty

You asked for something about OAuth — we did.
 
Here is a mindmap about hacking OAuth 2.0. We tried to cover all possible ways even with low impact.

Our inspiration was homakov.blogspot.com/search?q=oauth
Thanks to <a href="/homakov/">Egor Homakov</a> for outstanding articles.

#BugBountyTip #CyberSecurity #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Sometimes you can control the href value in HTML tag<a>. So it's a good place for XSS payload! We've created a scheme how to use various encodings in href to bypass filters. gist.github.com/hackerscrolls/… XSS Payloads #BugBountyTip #Bypass

Sometimes you can control the href value in HTML tag&lt;a&gt;. So it's a good place for XSS payload! 

We've created a scheme how to use various encodings in href to bypass filters.

gist.github.com/hackerscrolls/…

<a href="/XssPayloads/">XSS Payloads</a>
#BugBountyTip #Bypass
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Last time we showed you how to use encodings in <a>. Now we've made a scheme what symbols in which points you can inject to bypass WAF, filters, sanitizers. gist.github.com/hackerscrolls/… #BugBounty #CyberSecurity #BugBountyTip

Last time we showed you how to use encodings in &lt;a&gt;. 

Now we've made a scheme what symbols in which points you can inject to bypass WAF, filters, sanitizers.

gist.github.com/hackerscrolls/…

#BugBounty #CyberSecurity #BugBountyTip
HITBSecConf (@hitbsecconf) 's Twitter Profile Photo

#HITBLockdown002 D2T1 - The Weakest Element of Acquiring Bank Infrastructure - Ilia Bulatov & Gleb Cherbov - conference.hitb.org/hitb-lockdown0…

HITBSecConf (@hitbsecconf) 's Twitter Profile Photo

Next up on #HITBLockdown002 Track 1: "The Weakest Element of Acquiring Bank Infrastructure" Presented by Ilia Bulatov & Gleb Cherbov Starts 17:00 SGT at youtu.be/Yp7W4hiLpJY Ask questions via our Slido channel #askinthebox

Next up on #HITBLockdown002 Track 1:

"The Weakest Element of Acquiring Bank Infrastructure"
Presented by Ilia Bulatov &amp; Gleb Cherbov

Starts 17:00 SGT at youtu.be/Yp7W4hiLpJY

Ask questions via our Slido channel #askinthebox
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

There is a popular opinion: bad CORS like <Access-Control-Allow-Origin: *> is unexploitable. Browser won't send cookies in this case. It is a delusion. You can exploit it with a Chrome cache feature! For example: hackerone.com/reports/761726 #BugBountyTip #CyberSecurity #BugBounty

There is a popular opinion: bad CORS like &lt;Access-Control-Allow-Origin: *&gt; is unexploitable. Browser won't send cookies in this case.

It is a delusion. You can exploit it with a Chrome cache feature!

For example:
hackerone.com/reports/761726

#BugBountyTip #CyberSecurity #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

We continue to talk about attacks on CORS. This time, we have prepared a set of ideas for bypassing lists of allowed hosts. #CyberSecurity #BugBountyTip #BugBounty

We continue to talk about attacks on CORS.
This time, we have prepared a set of ideas for bypassing lists of allowed hosts.

#CyberSecurity #BugBountyTip #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Incredible mindmap about hacking iOS applications by H̷͙̰͕̼̫̥͔̮͓͈͉̩͇̯̍̄̍́͊̋̓͜_̸̭̤̻̫͚̗͒̀́̊͆͜D̷̛̈́̏̓̈̒̈͂̚͝ Pay attention, we have prepared two versions: 1. Full Security Assessments 2. Shorter BugBounty version XMind source: github.com/hackerscrolls/… #CyberSecurity #BugBountyTip #BugBounty #iOS

Incredible mindmap about hacking iOS applications by <a href="/hd_421/">H̷͙̰͕̼̫̥͔̮͓͈͉̩͇̯̍̄̍́͊̋̓͜_̸̭̤̻̫͚̗͒̀́̊͆͜D̷̛̈́̏̓̈̒̈͂̚͝</a> 

Pay attention, we have prepared two versions:
1. Full Security Assessments 
2. Shorter BugBounty version

XMind source:
github.com/hackerscrolls/…

#CyberSecurity #BugBountyTip #BugBounty #iOS
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

We have combined all the tricks we know about SSRF into a single mindmap. If we missed something, write about it in the comments! High resolution: raw.githubusercontent.com/hackerscrolls/… XMind source: github.com/hackerscrolls/… #CyberSecurity #BugBountyTip #BugBounty

We have combined all the tricks we know about SSRF into a single mindmap.

If we missed something, write about it in the comments!

High resolution: raw.githubusercontent.com/hackerscrolls/…
XMind source: github.com/hackerscrolls/…

#CyberSecurity #BugBountyTip #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

We often get confused how Samesite affects cookies in different attacks in modern browsers. So, we have made a memo and now share it with you. #CyberSecurity #BugBountyTip #BugBounty

We often get confused how Samesite affects cookies in different attacks in modern browsers. So, we have made a memo and now share it with you.

#CyberSecurity #BugBountyTip #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Looking for a stable reverse proxy for pivoting? Check frp! Useful when you've hacked a server and want to establish a channel to the internal network. A lot of options for pivoting, multiplatform and easy to use. github.com/fatedier/frp #CyberSecurity #Pentest #RedTeam

Looking for a stable reverse proxy for pivoting? Check frp!

Useful when you've hacked a server and want to establish a channel to the internal network.

A lot of options for pivoting, multiplatform and easy to use.

github.com/fatedier/frp

#CyberSecurity #Pentest #RedTeam
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

Found a hidden HTTP param? Look deeper, maybe there is a mass assignment/autobinding vulnerability. Sometimes changes in objects are hidden too and you need to closely explore the app. Source: itzone.com.vn/en/article/mas… #CyberSecurity #BugBountyTip #BugBounty

Found a hidden HTTP param? Look deeper, maybe there is a mass assignment/autobinding vulnerability.

Sometimes changes in objects are hidden too and you need to closely explore the app. 

Source:
itzone.com.vn/en/article/mas…

#CyberSecurity #BugBountyTip #BugBounty
Hack3rScr0lls (@hackerscrolls) 's Twitter Profile Photo

So, you can upload a file to the web app.. Bonus! Repo with slightly old exploits for image upload: github.com/barrracud4/ima… XMind source: github.com/hackerscrolls/… Thanks to hacktricks and HolyBugx for new tricks (at least for us) book.hacktricks.xyz/pentesting-web… x.com/HolyBugx/statu…

So, you can upload a file to the web app..

Bonus! Repo with slightly old exploits for image upload:
github.com/barrracud4/ima…

XMind source:
github.com/hackerscrolls/…

Thanks to hacktricks and <a href="/HolyBugx/">HolyBugx</a> for new tricks (at least for us)
book.hacktricks.xyz/pentesting-web…
x.com/HolyBugx/statu…