Ninad Mishra (@ninadmishra5) 's Twitter Profile
Ninad Mishra

@ninadmishra5

Follow me for daily tips on cybersecurity, bugbounty hunting & researching .
opinions are my own
linktr.ee/ninadmishra5

ID: 1325417398967492609

linkhttps://www.linkedin.com/in/ninad-mishra-73b279157/ calendar_today08-11-2020 12:38:42

1,1K Tweet

6,6K Followers

655 Following

Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

Cybersecurity job requirements in 2025: Entry level position: 10 years experience Must know: Every CVE since 1999 Bonus: Time travel experience preferred

Pratik Dabhi (@impratikdabhi) 's Twitter Profile Photo

Read “Unauthenticated Kibana Dashboard Access — A Serious Security Risk You Can’t Ignore“ by Pratik Dabhi on Medium: infosecwriteups.com/unauthenticate… #bugbounty #infosec #hacking

Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

I once found a critical on a public bug bounty program just by viewing the source code of a page, here's what happened👇 1. Target implemented a feature allowing users to post private images on their profile 2. images were publicly accessible by URLs leaking in the html source💰

Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

Imagine being so bored that you run cat ./stealerlogs/* >>new_16_B_leak.txt And then release an article of 16 billion credentials leaked And tell people that this "breach" is so new even the people releasing it don't have exact sources 😂

Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

New Web3 Hack👇 pump.foundatlon account is compromised and scamming web3 users, by talking about a fake pump.fun airdrop, look at how beautifully they're trying to scam people by using @x's article feature😍 and also have created 697 Posts so far mentioning potential web3 users

New Web3 Hack👇
<a href="/OraCareUK/">pump.foundatlon</a> account  is compromised and scamming web3  users, by talking about a fake <a href="/pumpdotfun/">pump.fun</a> airdrop, look at how beautifully they're trying to scam people by using @x's article feature😍 and also have created 697 Posts so far mentioning potential web3 users
Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

The problem with bugbounty platforms banning researchers without accurate reasonability is that, at the end it's the customer of the platform that suffers along with the researchers simply due to bad decision making of the platform

Ninad Mishra (@ninadmishra5) 's Twitter Profile Photo

Lets understand why this is a clickbait - How links get indexed? links shared on public platforms are hit by crawlers, nothing was actually leaked here these links were shared publicly (that's how crawlers accessed it) Fix: adding an meta noindex html tag in these links

‌Renwa (@renwax23) 's Twitter Profile Photo

Since Apple doesn’t care, I don’t care either. Here are the details of an address bar spoof vulnerability in Safari on Mac using custom cursor overlap - Apple said it’s *not* a vulnerability. github.com/RenwaX23/X/blo…