Kevin (@rohk_infosec) 's Twitter Profile
Kevin

@rohk_infosec

staff application security engineer at @Okta - all tweets are my own

ID: 714975830917517312

calendar_today30-03-2016 00:41:36

1,1K Tweet

5,5K Followers

191 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Want to know how to exploit the recently patched #Microsoft #Exchange CVE-2020-0688? @hexkitchen provides the details on how to take advantage of the fixed cryptographic keys used during installation. bit.ly/2TefZfv

AIfredo 0rtega (@ortegaalfredo) 's Twitter Profile Photo

This is the complete DNA of the Coronavirus (SARS-CoV-2). We are being attacked by a 8 kilobytes virus. Remember this when you hate on computers security. (source: ncbi.nlm.nih.gov/nuccore/MN9089… )

This is the complete DNA of the Coronavirus (SARS-CoV-2). We are being attacked by a 8 kilobytes virus. Remember this when you hate on computers security. (source: ncbi.nlm.nih.gov/nuccore/MN9089… )
AISECUREME (@aisecureme) 's Twitter Profile Photo

Another SSRF List: http://[::]:80/ http://[::]:25/ http://[::]:22/ http://[::]:3128/ http://0000::1:80/ http://0000::1:25/ http://0000::1:22/ http://0000::1:3128/ http://127.0.1.3 http://127.0.0.0 http://0177.0.0.1/ http://2130706433/ http://3232235521/ http://3232235777/

Luke Stephens (hakluke) (@hakluke) 's Twitter Profile Photo

I'm noticing a surprising number of people submitting CSRF PoCs with the CSRF token in the actual PoC. If the attack requires you to know a victim's CSRF token and you have no way of getting it, then it is not a vulnerability!

Kevin (@rohk_infosec) 's Twitter Profile Photo

whenever the topic sushi comes to mind.. this memory always pops up: Friend: Omg I love sushi! *Orders sushi rolls* Me: You should try some nigiri or sashimi! Friend: Ah sorry.. I don't like raw fish! Me: ...

Kevin (@rohk_infosec) 's Twitter Profile Photo

i haven't been able to log into my bank account for the past couple of weeks.. found out because my device name had an XSS payload.

Kevin (@rohk_infosec) 's Twitter Profile Photo

Hey everyone! Okta's bug bounty program on bugcrowd will be running a 2-3x multiplier on all eligible reports until July 31st! Come check us out at bugcrowd.com/okta

Kevin (@rohk_infosec) 's Twitter Profile Photo

As Okta's bug bounty program continues to pay 2-3x until July 31st, we introduced another product to the scope! Advanced Server Access! Check it out!

Kevin (@rohk_infosec) 's Twitter Profile Photo

Okta is paying to up $100k for an RCE and paying an additional $2,500 for an XSS bypassing our validation and CSP! bugcrowd.com/okta/updates/0… bugcrowd

Kevin (@rohk_infosec) 's Twitter Profile Photo

Okta scope increased again! We've added Okta OIE & Okta Access Requests (AtSpoke). More information can be found at bugcrowd.com/okta