PentesterLand (@pentesterlanden) 's Twitter Profile
PentesterLand

@pentesterlanden

WNMC Penetration Tester
RedTeamer
BugHunter
Instagram: PentesterLand

ID: 1757018122752598016

calendar_today12-02-2024 12:26:00

55 Tweet

1,1K Followers

60 Following

PentesterLand (@pentesterlanden) 's Twitter Profile Photo

I hope to enjoy my senario: t.me/pentesterlande… I recorded video message, about how can i chained some boring vulnerabilities and made P1 report #bugbountytips #BugBounty #redteam #mindset #bugbountytip #xss #broken_access_control #writeup

PentesterLand (@pentesterlanden) 's Twitter Profile Photo

🚨Gained full access to one of the world’s biggest IT companies?! Just dropped a new video showing how I found & exploited a critical vuln 🔥 🎥 youtu.be/ieGqGrGe4tg 🔒 Disclaimer: This video is not related to any report submitted on platforms such as HackerOne, Bugcrowd.

🚨Gained full access to one of the world’s biggest IT companies?!
Just dropped a new video showing how I found & exploited a critical vuln 🔥
🎥 youtu.be/ieGqGrGe4tg

🔒 Disclaimer: This video is not related to any report submitted on platforms such as HackerOne, Bugcrowd.
PentesterLand (@pentesterlanden) 's Twitter Profile Photo

I earned $5,043 for my submissions on @bugcrowd I focused on a single application and analyzed each function in 5 aspects: Create, Read, Update, Delete (CRUD), and how its output was consumed by other functions (second-order usage) #becreative #BugBountytips #bugbountytip

I earned $5,043 for my submissions on @bugcrowd 
I focused on a single application and analyzed each function in 5 aspects: Create, Read, Update, Delete (CRUD), and how its output was consumed by other functions (second-order usage)
#becreative
#BugBountytips
#bugbountytip
PentesterLand (@pentesterlanden) 's Twitter Profile Photo

The questions people ask Grok say more about us than about AI. That’s when it hit me: AI will control us not with force, but by shaping what we want to know. And the wild part? We’ll gladly let it. 😁

PentesterLand (@pentesterlanden) 's Twitter Profile Photo

🚨 Silent Wallet Theft Uncovered! We explore a new and stealthy technique attackers use to drain crypto wallets without a trace. 🔍 Don’t miss it, stay one step ahead! Link 🔗: instagram.com/reel/DM3IagHIR… #DigitalTheft #CryptoWallet #WalletHack #Blockchain #CryptoSecurity

PentesterLand (@pentesterlanden) 's Twitter Profile Photo

Initial access with Copy+Paste It can chain with supply chain breach and Dependency confusion (advance scenario) I used cobalt streak dll payload for demo initial access

PentesterLand (@pentesterlanden) 's Twitter Profile Photo

🚨 Soon, I will be revealing a new type of vulnerability in the Broken Access Control layer. The root cause is quite similar to what qI explained in the YouTube video below, but the exploitation method is completely different and unique. By combining two very simple (and often