cachemeifucan (@mattitguy) 's Twitter Profile
cachemeifucan

@mattitguy

strive to be the best version of you ✝️

ID: 794019672458809344

calendar_today03-11-2016 03:33:36

102 Tweet

983 Followers

110 Following

cachemeifucan (@mattitguy) 's Twitter Profile Photo

Good past few days at synack, managed to find another SQL injection and a file inclusion on some IIS targets. Been loving bitquark's shortscan tool combined with FFUF to find deep/hidden assets. #bugbounty github.com/bitquark/short…

Good past few days at synack, managed to find another SQL injection and a file inclusion on some IIS targets. Been loving bitquark's shortscan tool combined with FFUF to find deep/hidden assets. #bugbounty github.com/bitquark/short…
cachemeifucan (@mattitguy) 's Twitter Profile Photo

The dangers of kernel-level access from these saas security vendors have never been clearer than today. It's not about moving laterally to competitor product with the same access. It's reevaluating these solutions wholistically and moving towards limiting kernel access.

daniel (@hackermondev) 's Twitter Profile Photo

1 Bug, $50K+ in bounties: how Zendesk left a backdoor in hundreds of companies #bugbountytips gist.github.com/hackermondev/6…

cachemeifucan (@mattitguy) 's Twitter Profile Photo

Took a bit of a break but started back up last week. One neat tip for SQL Injections: If you find that you can enumerate database and table names but not column names in an injection, there is likely SELECT based column permission restrictions on the current DB user. These are

Took a bit of a break but started back up last week. One neat tip for SQL Injections: 

If you find that you can enumerate database and table names but not column names in an injection, there is likely SELECT based column permission restrictions on the current DB user. These are
cachemeifucan (@mattitguy) 's Twitter Profile Photo

Have had an unhealthy, borderline autistic obsession with looking for SQL injections lately. November being another case in point with nearly $30k worth of them across a few targets. Something about them just call to me. Wish I had some sick tip to share for them but there was

Have had an unhealthy, borderline autistic obsession with looking for SQL injections lately. November being another case in point with nearly $30k worth of them across a few targets.

 Something about them just call to me.

Wish I had some sick tip to share for them but there was
cachemeifucan (@mattitguy) 's Twitter Profile Photo

Do people actually think triage teams have the bandwidth to personally reply to each report with the amount of garbage that hits their inbox every day? Of course they use templates like lol

cachemeifucan (@mattitguy) 's Twitter Profile Photo

Weird SQLi on an old ASP target — Here's how I got in 👇 1) Stumbled across a dusty looking ASP app & a classic login form. Nothing fancy, just a POST to /login.asp with username and password. But the backend was doing something weird with sp_executesql. 2) Initial payloads

Justin Gardner (@rhynorater) 's Twitter Profile Photo

Exciting announcement - our (cc Joseph Thacker) plugin Shift was acquired by Caido! Aaand they've made it free. ^_^ thanks Caido Now, natural language HTTP modification, AI-powered Replay tab renaming, and much more are available to all. Check the vid below for features.

cachemeifucan (@mattitguy) 's Twitter Profile Photo

Add handler.ashx to your IIS wordlists, if you ever see it served on an IIS target always test it for path traversal / LFI. These pages at first glance look like nothing (because all code execution happens server side) but I've found multiple of these endpoints this year alone

Add handler.ashx to your IIS wordlists, if you ever see it served on an IIS target always test it for path traversal / LFI. These pages at first glance look like nothing (because all code execution happens server side) but I've found multiple of these endpoints this year alone