Jens Fischer (@jensfischerhh) 's Twitter Profile
Jens Fischer

@jensfischerhh

It is pitch black. I am likely to be eaten by a grue.

ID: 108395697

linkhttp://linkedin.com/in/jensfischerhh calendar_today25-01-2010 20:26:52

4,4K Tweet

322 Followers

755 Following

Jens Fischer (@jensfischerhh) 's Twitter Profile Photo

Danke Harm, und auf diesem Weg kommen meine (nachträglichen) Glückwünsche auch zurück zu dir! Vielleicht schnacken wir mal wieder, sobald physische Meetups wieder Realität sind

Jens Fischer (@jensfischerhh) 's Twitter Profile Photo

Solche Flash Sales sind echt der Hammer! Bin froh, bei ⁦ottotech_solutions⁩ an Cloud Lösungen für solche extremen Anwendungsfälle arbeiten zu dürfen #otto #ps5 #flashsale spiegel.de/netzwelt/netzp…

Jens Fischer (@jensfischerhh) 's Twitter Profile Photo

Today starts the #OttoGroup #DOQ21 conference. I will participate with a live coding session about OpenTracing and #OTTO #ReST #API. No static backup slides/videos, so let's see if this will work out :-) ottotech_solutions

Diana Kruse (@dianakkruse) 's Twitter Profile Photo

Jens Fischer with "CSI: OTTO - From Zero to Distributed Tracing in 5 minutes!" Can it really work that quickly? I am curious. #DOQ21 #OttoGroup #Developer #DevOps #Quality ottotech_solutions

<a href="/jensfischerhh/">Jens Fischer</a> with "CSI: OTTO - From Zero to Distributed Tracing in 5 minutes!" Can it really work that quickly? I am curious.

#DOQ21 #OttoGroup #Developer #DevOps #Quality <a href="/otto_tech/">ottotech_solutions</a>
Diana Kruse (@dianakkruse) 's Twitter Profile Photo

#DOQ21 #OttoGroup #Developer #DevOps #Quality ottotech_solutions Thx @julifreudenberg from @hckrschl for the really nice keynote. Interesting how you switch easiely from offline to online hackerschooldays

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

How to test your apps for #log4shell vulnerability 1. Generate a DNS token canarytokens.org/generate# 2. Wrap that token in Prefix: ${jndi:ldap:// Suffix: /a} 3. Use that value in search forms, profile data, settings etc. of your apps 4. Get notified when you triggered a reaction

How to test your apps for #log4shell vulnerability

1. Generate a DNS token canarytokens.org/generate#
2. Wrap that token in 
Prefix: ${jndi:ldap://
Suffix: /a}
3. Use that value in search forms, profile data, settings etc. of your apps
4. Get notified when you triggered a reaction
Bruno Borges (@brunoborges) 's Twitter Profile Photo

JAVA_TOOL_OPTIONS=-Dlog4j.formatMsgNoLookups=true This is a good way to consider using to set the flag at the environment level, if you don't know where to look to change the startup shell scripts of Java apps. You can also inject this into your #Kubernetes containers.

JAVA_TOOL_OPTIONS=-Dlog4j.formatMsgNoLookups=true

This is a good way to consider using to set the flag at the environment level, if you don't know where to look to change the startup shell scripts of Java apps.

You can also inject this into your #Kubernetes containers.
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

Time for the big reveal! Our Live #BugBounty partner at #NullconDE2023 is… OTTO, Germany’s leading e-commerce retailer🔥 To all hunters attending NULLCON, join us for 30 hours of hard pwn on an exclusive scope! Follow the leaderboard here 👉 event.yeswehack.com/events/nullcon…

Time for the big reveal! Our Live #BugBounty partner at #NullconDE2023 is… <a href="/otto_de/">OTTO</a>, Germany’s leading e-commerce retailer🔥

To all hunters attending <a href="/nullcon/">NULLCON</a>, join us for 30 hours of hard pwn on an exclusive scope!

Follow the leaderboard here 👉 event.yeswehack.com/events/nullcon…
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

🤩 How about a video throwback? Our Live #BugBounty with OTTO at #NullconDE2023 was a blast, so we’re excited to let you relive the moment with us! Many thanks to OTTO's security team, to all hunters and to NULLCON for this amazing event! Here’s how it went 👇