Rohan_lew (@rohan_lew) 's Twitter Profile
Rohan_lew

@rohan_lew

Genius by birth Hacker by choice ๐Ÿง‘โ€๐Ÿ’ป

ID: 1286904394089291777

calendar_today25-07-2020 06:01:46

803 Tweet

3,3K Followers

289 Following

Vivek Kumar Digar (@vivekkk_a) 's Twitter Profile Photo

Privilege Escalation in Action! ๐Ÿ”ฅ Collab with bros Rohan_lew, Atif Alam ๐Ÿ‡ฎ๐Ÿ‡ณ . . . . #BugBounty #CyberSecurity #InfoSec #Hacking #CyberSecurityNews #BugBountyTips #EthicalHacking #Pentesting #CTF #RedTeam #BlueTeam #CyberThreats #OffensiveSecurity #SecurityResearch

Privilege Escalation in Action! ๐Ÿ”ฅ

Collab with bros <a href="/Rohan_Lew/">Rohan_lew</a>, <a href="/atif2816/">Atif Alam ๐Ÿ‡ฎ๐Ÿ‡ณ</a>
.
.
.
.
#BugBounty #CyberSecurity #InfoSec #Hacking #CyberSecurityNews #BugBountyTips #EthicalHacking #Pentesting #CTF #RedTeam #BlueTeam #CyberThreats #OffensiveSecurity #SecurityResearch
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

๐Ÿšจ OSCP GIVEAWAY ALERT๐Ÿšจ Weโ€™re giving away 3 OSCP vouchers to supercharge your pentesting journey โ€“ proudly sponsored by OffSec ! ๐Ÿ’ฅ๐Ÿ™Œ To enter: 1.โœ… Follow Us 2.๐Ÿ” Retweet this post 3.โค๏ธ Like this post 4.๐Ÿ’ฌ Reply with your funniest cybersecurity meme ๐ŸŽฏ Weโ€™ll pick 3

๐Ÿšจ OSCP GIVEAWAY ALERT๐Ÿšจ

Weโ€™re giving away 3 OSCP vouchers to supercharge your pentesting journey โ€“ proudly sponsored by <a href="/offsectraining/">OffSec</a> ! ๐Ÿ’ฅ๐Ÿ™Œ

To enter:
1.โœ… Follow Us
2.๐Ÿ” Retweet this post
3.โค๏ธ Like this post
4.๐Ÿ’ฌ Reply with your funniest cybersecurity meme

๐ŸŽฏ Weโ€™ll pick 3
Builders (@buildersroi) 's Twitter Profile Photo

EXPOSED: 200+ AI Agents have been LEAKED... These Agents SELL for $5,000+ per build and cover 20+ industries... Inside the file youโ€™ll get: โ†’Social Media Agents ($8k+) โ†’Creative Content Agents ($3k+) โ†’Cold outreach Agents ($3k+) โ†’Lead Booking Agents ($6k+) โ†’Customer

Vivek Kumar Digar (@vivekkk_a) 's Twitter Profile Photo

Privilege Escalation Unlocked! ๐Ÿ”ฅ Found yet another way to bypass role-based restrictions and gain unauthorized access. Always validate permissions server-side โ€” donโ€™t trust the client! Rohan_lew #bugbounty #cybersecurity #infosec #hacking #CybersecurityNews #bugbountytips

Privilege Escalation Unlocked! ๐Ÿ”ฅ

Found yet another way to bypass role-based restrictions and gain unauthorized access. Always validate permissions server-side โ€” donโ€™t trust the client!

<a href="/Rohan_Lew/">Rohan_lew</a>

#bugbounty #cybersecurity #infosec #hacking #CybersecurityNews #bugbountytips
Rohan_lew (@rohan_lew) 's Twitter Profile Photo

Read โ€œHow I Hacked An AI Based Companyโ€œ by Rohan_lew on Medium: medium.com/@lewrohan1/howโ€ฆ #bugbounty #infosec

Atif Alam ๐Ÿ‡ฎ๐Ÿ‡ณ (@atif2816) 's Twitter Profile Photo

Hi everyone I have reported a critical bug on one target IP and checked it's SSL certificate and confirmed using Nmap the IP belongs to the target only like sub.target.com and the company saying it's not belong to the our organisation how? bugcrowd Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด

Hi everyone 
I have reported a critical bug on one target IP and checked it's SSL certificate and confirmed using Nmap the IP belongs to the target only like sub.target.com and the company saying it's not belong to the our organisation how? <a href="/Bugcrowd/">bugcrowd</a> <a href="/GodfatherOrwa/">Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด</a>
Atif Alam ๐Ÿ‡ฎ๐Ÿ‡ณ (@atif2816) 's Twitter Profile Photo

Reported โ†’ Triaged โ†’ Rewarded โ†’ Patched One week laterโ€ฆ Tried bypass with %00 โ†’ Reported again โ†’ Retriaged Sometimes the patch is just the beginning. Tips :- https://example[.]com/endpoint -> Forbidden https://example[.]com/endpoint%00 -> bypassed #bugbountytips

Reported โ†’ Triaged โ†’ Rewarded โ†’ Patched
One week laterโ€ฆ
Tried bypass with %00 โ†’ Reported again โ†’ Retriaged

Sometimes the patch is just the beginning.

Tips :- https://example[.]com/endpoint -&gt; Forbidden 
https://example[.]com/endpoint%00 -&gt; bypassed

#bugbountytips