Gospel.C (@40sp3l) 's Twitter Profile
Gospel.C

@40sp3l

Offensive Security // Security Researcher // CEO @PentrixSec

ID: 1704402802263371776

linkhttps://www.youtube.com/@pentrixsec calendar_today20-09-2023 07:51:23

5,5K Tweet

11,11K Takipรงi

7,7K Takip Edilen

Gospel.C (@40sp3l) 's Twitter Profile Photo

Need help confirming a possible subdomain takeover on redacted.com If you have an AWS account and know how to set up ELB stuff, letโ€™s work together on a quick PoC. We'll split 50/50

Need help confirming a possible subdomain takeover on redacted.com 

If you have an AWS account and know how to set up ELB stuff, letโ€™s work together on a quick PoC.

We'll split 50/50
Gospel.C (@40sp3l) 's Twitter Profile Photo

You donโ€™t need to know everything in cybersecurity. Just find one thing you love, get really good at it, and youโ€™ll earn respect that no one can take away.

Naoris Protocol (@naorisprotocol) 's Twitter Profile Photo

๐Ÿ“ข $NAORIS New Public Sale Round Live Following our successful $3M raise, the new Public Sale round is now open. ๐—ก๐—ฎ๐—ผ๐—ฟ๐—ถ๐˜€ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ผ๐—ฐ๐—ผ๐—น - The first Decentralized Post-Quantum Infrastructure securing Web3 and Web2 for the Quantum Era. ๐Ÿ”น๐—Ÿ๐—ถ๐—บ๐—ถ๐˜๐—ฒ๐—ฑ

๐Ÿ“ข $NAORIS New Public Sale Round Live

Following our successful $3M raise, the new Public Sale round is now open.

๐—ก๐—ฎ๐—ผ๐—ฟ๐—ถ๐˜€ ๐—ฃ๐—ฟ๐—ผ๐˜๐—ผ๐—ฐ๐—ผ๐—น - The first Decentralized Post-Quantum Infrastructure securing Web3 and Web2 for the Quantum Era.

๐Ÿ”น๐—Ÿ๐—ถ๐—บ๐—ถ๐˜๐—ฒ๐—ฑ
Gospel.C (@40sp3l) 's Twitter Profile Photo

Some days ago, I mentioned I was going to take the red team approach on some off-platform targetsโ€ฆ but plans change. After thinking it through, Iโ€™ve decided to make a solid move, from now on, Iโ€™m going all in on #Cloudflare as my primary target for the bug hunt challenge.

Gospel.C (@40sp3l) 's Twitter Profile Photo

Hacking Google Translate : Stored XSS Discovered by Our Researcher. - The payload was executed inside a Google-owned domain. Vulnerability was responsibly disclosed & now patched. youtu.be/t41GwFCIxes?siโ€ฆ

Gospel.C (@40sp3l) 's Twitter Profile Photo

Target - Cloudflare Time spent: ~3hrs Terrain: API endpoints Findings: 0 (so far) Spent about 3 hours digging through their API assets, nothing popped yet. Short break now. We return under moonlight.

Gospel.C (@40sp3l) 's Twitter Profile Photo

I discovered an exposed cloudflare EMAIL & TOKEN in an environment not owned or controlled by cloudflare I was able to use the exposed cred to authenticate to the cloudflare API endpoint and i got access. Don't know if cloudflare is gonna close it as OUT-OF-SCOPE

Gospel.C (@40sp3l) 's Twitter Profile Photo

I think companies should rethink how they treat out-of-scope reports I get that OOS is against the rules, but rejecting a critical flaw ( let's say RCE ) just because itโ€™s OOS, then silently fixing it, doesnโ€™t sit right. A little reward for critical vulns goes a long way.

Gospel.C (@40sp3l) 's Twitter Profile Photo

CSP Bypass โ†’ DOM XSS - script-src was strict, but object-src left open - Injected SVG file with embedded JS - Loaded via <object data=evil.svg> โ†’ executes in origin - JS inside SVG triggers DOM sink (location.hash)

Gospel.C (@40sp3l) 's Twitter Profile Photo

Cloudflare is everywhere i.e websites, mobile apps, OS, IoT devices. So... what if someone actually hacked Cloudflare ? ๐Ÿ‘€ Think about it, almost every asset relying on it for security could be exposed. Just a thought, lol. Donโ€™t bite me, Iโ€™m just brainstorming ๐Ÿ˜…๐Ÿ’ญ

Gospel.C (@40sp3l) 's Twitter Profile Photo

Tried a SQL injection and got blocked ? Sometimes, thatโ€™s the WAF, and not the app being secure. Bypass the WAF, and boom, the appโ€™s exposed. It was never truly safe, just hiding behind that shield. Like a kid hiding behind their parent, take the parent away, see the real truth.

Gospel.C (@40sp3l) 's Twitter Profile Photo

First report to #Cloudflare - Cloudflare Global API Key and email exposed in a public repository. "Cloudflare appreciates researchers who take time to report leaked credentials" - let's see if they're gonna accept this.

First report to #Cloudflare 

- Cloudflare Global API Key and email exposed in a public repository.

"Cloudflare appreciates researchers who take time to report leaked credentials" - let's see if they're gonna accept this.