Dejan Zelic (@dejandayoff) 's Twitter Profile
Dejan Zelic

@dejandayoff

Cloud, WEB-300 (AWAE), and WEB-200 Content Developer at Offensive Security. Also helped on PEN-210(WiFu), PEN-200 (PWK), EXP-312, Thoughts are my own.

ID: 3666946214

linkhttps://dejandayoff.com calendar_today24-09-2015 05:15:20

153 Tweet

383 Followers

278 Following

Dejan Zelic (@dejandayoff) 's Twitter Profile Photo

The book "Advanced Penetration Testing: Hacking AWS" by Richard Knowell plagiarized my DNS exfil article. I've included a snippet of the comparison in the book. I tried to contact the publisher (CreateSpace, run by Amazon) and they didn't do anything about it. PSA: don't buy it!

The book "Advanced Penetration Testing: Hacking AWS" by Richard Knowell plagiarized my DNS exfil article. I've included a snippet of the comparison in the book. I tried to contact the publisher (CreateSpace, run by <a href="/amazon/">Amazon</a>) and they didn't do anything about it. PSA: don't buy it!
Dejan Zelic (@dejandayoff) 's Twitter Profile Photo

Here is a good reason to not expose the Docker socket in a container or remotely: dejandayoff.com/the-danger-of-… #security #exploit #Docker #DevOps

openITCOCKPIT (@openitcockpit) 's Twitter Profile Photo

openITCOCKPIT 3.7.3 got released! 🥳🎉 This release resolve critical #security #vulnerabilities discovered by Dejan Zelic Dejan Zelic and Offensive Security OffSec - Update now! ↗️ openitcockpit.io/2020/2020/03/2… #monitoringLove #securityLove

openITCOCKPIT 3.7.3 got released! 🥳🎉
This release resolve critical #security #vulnerabilities discovered by Dejan Zelic <a href="/dejandayoff/">Dejan Zelic</a> and Offensive Security <a href="/offsectraining/">OffSec</a> - Update now! ↗️
openitcockpit.io/2020/2020/03/2…

#monitoringLove #securityLove
OffSec (@offsectraining) 's Twitter Profile Photo

So CSC is doing take down requests on Exploit Database for any entry that contains the string “IBM” on behalf of Business Software Alliance and IBM. Very interesting. Anyone want to place bets on how this is going to turn out? exploit-db.com/exploits/41613

So <a href="/CSCGlobal/">CSC</a> is doing take down requests on <a href="/ExploitDB/">Exploit Database</a> for any entry that contains the string “IBM” on behalf of <a href="/BSAnews/">Business Software Alliance</a> and <a href="/IBM/">IBM</a>. Very interesting. 

Anyone want to place bets on how this is going to turn out?

exploit-db.com/exploits/41613
Immortal Technique (@immortaltech) 's Twitter Profile Photo

Imagine if the USA collapsed. Not this but rather total chaos, not hunger but starvation. A real war. Suddenly they’re targeting groups of people. People like you. So you run to another country and when you get there they throw your kids in a cage. You fuckin people get it now?

OffSec (@offsectraining) 's Twitter Profile Photo

We’ve updated AWAE with 50% more material, including: ✔️ XML external entity injection ✔️ Weak random token generation ✔️ DOM XSS And more. Students currently in the course update for free! Explore the update: offs.ec/3fuIE9V

We’ve updated AWAE with 50% more material, including:

✔️ XML external entity injection
✔️ Weak random token generation
✔️ DOM XSS

And more. Students currently in the course update for free! Explore the update: offs.ec/3fuIE9V
OffSec (@offsectraining) 's Twitter Profile Photo

AWAE content developer Dejan Zelic discovered and reported an authentication bypass vulnerability in Wekan. Check out the walkthrough: offs.ec/2R8ockW

AWAE content developer <a href="/dejandayoff/">Dejan Zelic</a> discovered and reported an authentication bypass vulnerability in Wekan. Check out the walkthrough: offs.ec/2R8ockW
OffSec (@offsectraining) 's Twitter Profile Photo

Github Hall-of-fame alert 🚨 Earlier this year, our team discovered vulnerabilities in Wekan. Step 1, exploit Meteor: offs.ec/3or6Iim

Github Hall-of-fame alert 🚨 Earlier this year, our team discovered vulnerabilities in Wekan. Step 1, exploit Meteor: offs.ec/3or6Iim
Csaba Fitzl (@theevilbit) 's Twitter Profile Photo

A few quick posts for the "Beyond the good ol' LaunchAgents" series. Ideas from dade, Bradley Kemp and Dejan Zelic Part 6: SSHRC - theevilbit.github.io/beyond/beyond_… Part 7: xbar - theevilbit.github.io/beyond/beyond_… Part 8: Hammerspoon - theevilbit.github.io/beyond/beyond_…

DяA | daniruiz (@dani_ruiz24) 's Twitter Profile Photo

In case you want a more traditional prompt for your Kali Linux terminal screenshots, pressing Ctrl+P switches it instantly 😌👌 You can permanently configure it and much more with the new kali-tweaks command

Dejan Zelic (@dejandayoff) 's Twitter Profile Photo

I'm not good at bragging, but I'm proud of this. I discovered an authentication bypass vulnerability which leads compromise of a K8s Cluster. I flexed some new muscles and learned to reverse a go binary. github.com/neuvector/neuv… Kudos to SUSE and NeuVector, now part of SUSE for the quick fix!

Dejan Zelic (@dejandayoff) 's Twitter Profile Photo

This was a fun one to find, Arbitrary File Read via Symbolic links in Artifact Hub github.com/artifacthub/hu… Also found SSRF via Rego Policy (github.com/artifacthub/hu…) and Docker Credential Hijacking (github.com/artifacthub/hu…)

FalconSpy (@0xfalconspy) 's Twitter Profile Photo

I'm happy to publish a blog post regarding some Red Team tradecraft around Slack Impersonation tthat I've been working on. Please see falconspy.org/redteam/tradec… for more info. Big thanks Topher Timzen r00t killah Dejan Zelic for their help.