inspector-ambitious (@inspector_amb) 's Twitter Profile
inspector-ambitious

@inspector_amb

Full time father. Part time bug bounty hunter.

ID: 926659693

linkhttp://hackerone.com/inspector-ambitious calendar_today05-11-2012 02:16:33

296 Tweet

870 Followers

391 Following

inspector-ambitious (@inspector_amb) 's Twitter Profile Photo

Last year, Google VRP (Google Bug Hunters) closed a report I submitted as out of scope. I forgot about it. Today, they reassessed it — and just awarded me $50,000 🤯 It's my biggest bounty to date 🥳 Huge thanks to the Google VRP (Google Bug Hunters) team!

inspector-ambitious (@inspector_amb) 's Twitter Profile Photo

It feels good to learn a new technique to try to finish an exploit chain. Because you need it so bad that you're going to learn it really well.

inspector-ambitious (@inspector_amb) 's Twitter Profile Photo

Learning http request smuggling against a real target for 2 days. Understanding that go net/http is too secure. Pulling a go binary in Ghidra to understand that there is no filtering on http2 and that allow me to reach the host rpc services. Next step: RCE on host ? Maybe...

inspector-ambitious (@inspector_amb) 's Twitter Profile Photo

More reverse engineering today, I understood why my auth wasn't working. I need to get an arbitrary file read, if I want to move forward.