Rubén sg (@rsgbengii) 's Twitter Profile
Rubén sg

@rsgbengii

Cybersecurity engineer

I publish cybersecurity articles to help you learn cool cybersecurity stuff

ID: 757890711756894209

linkhttps://www.kayssel.com/ calendar_today26-07-2016 10:50:01

95 Tweet

96 Followers

96 Following

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Every Web3 exploit you've read about comes down to one thing: someone signed something they shouldn't have. New post: Understanding Ethereum Signatures - the single point of failure in Web3 security. kayssel.com/post/web3-19 #Web3Community #CyberSecurity #BugBounty #PenTesting

Rubén sg (@rsgbengii) 's Twitter Profile Photo

New on my newsletter: Docker Security, why containers are NOT a secure boundary. Spent the summer learning internals and building Valeris (a Rust scanner). Practical escape techniques, detection and defenses. Read: kayssel.com/newsletter/iss… #Hacking #InfoSec #CyberSecurity

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Not every “Sign message” is harmless. My latest deep dive covers how Ethereum signatures really work. RLP, EIP-191, and why confusing the two types can cost you everything. Read it here → kayssel.com/post/web3-20/ #InfoSec #Web3Community #Hacking #CyberSecurity #Ethereum

Rubén sg (@rsgbengii) 's Twitter Profile Photo

New newsletter post is live! 🔥 Prototype Pollution explained: real CVEs, exploitation → RCE kayssel.com/newsletter/iss… #CyberSecurity #InfoSec #BugBounty

Rubén sg (@rsgbengii) 's Twitter Profile Photo

💣 File upload bugs = quick path to RCE. Double extensions, MIME spoofing, magic bytes… every “simple” upload form hides a full attack surface. Profile pics → webshell → game over. kayssel.com/newsletter/iss… #InfoSec #CyberSecurity #BugBounty

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Meta-transactions = gasless UX + new attack vectors Replay attacks, nonce manipulation, malicious relayers, front-running. Deep dive into EIP-2771 security with working exploits 👇 kayssel.com/post/web3-21/ #Web3Security #Ethereum #DEFİ #CyberSecurity #InfoSec

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Let’s confuse some servers 🤝😈 New issue: HTTP Request Smuggling the most elegant way to break the web. kayssel.com/newsletter/iss… #InfoSec #CyberSecurity #Pentesting

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Rust prevents memory corruption, not bad decisions. Panics, unchecked unwraps, logic flaws, unsafe blocks… all remain real attack surfaces. New newsletter breaking it down kayssel.com/newsletter/iss… #CyberSecurity #InfoSec #BugBounty

Rubén sg (@rsgbengii) 's Twitter Profile Photo

I’m learning AWS security from zero and documenting it S3 misconfigs, SSRF to metadata, basic cloud recon No cloud background required 📬 New security newsletter 👇 kayssel.com/newsletter/iss… #CyberSec #InfoSec #bugbountytips

Rubén sg (@rsgbengii) 's Twitter Profile Photo

iOS security isn’t magic. You don’t need a Mac to break apps 📱🔓 Full intro to iOS pentesting 👇 kayssel.com/newsletter/iss… #CyberSec #infosec #Pentesting

Rubén sg (@rsgbengii) 's Twitter Profile Photo

🔓 New: LDAP Injection & AD Exploitation Auth bypass, blind injection, enumeration, pass-back attacks. LDAP is SQL injection's overlooked cousin. kayssel.com/newsletter/iss… #CyberSec #infosec #Pentesting #BugBounty

Rubén sg (@rsgbengii) 's Twitter Profile Photo

gRPC is everywhere in modern backends, but testing it isn’t like REST. Binary traffic, protobuf, reflection, metadata-based auth… new attack surface, new tools. This chapter is a practical intro to pentesting gRPC 👇 🚀 kayssel.com/newsletter/iss… #Hacking #InfoSec #CyberSecurity

Rubén sg (@rsgbengii) 's Twitter Profile Photo

SSTI is one of the fastest paths from user input to RCE. Not XSS. Not client-side. You’re executing code on the server. New newsletter breaks it down 👇 kayssel.com/newsletter/iss… #CyberSecurity #infosec #bugbountytips

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Escaping Docker is just the beginning. Compromise one Kubernetes pod and you might own the entire cluster ☸️ New newsletter 👇 kayssel.com/newsletter/iss… #infosec #Hacking #Cybersecurity #bugbountytips

Rubén sg (@rsgbengii) 's Twitter Profile Photo

One payload. One object. 💥 RCE. Deserialization bugs across Java, Python, PHP, .NET & React. Broken down and weaponized. New newsletter 👇 kayssel.com/newsletter/iss… #CyberSecurity #infosec #BugBounty

Óscar Alfonso Díaz (@oscarakaelvis) 's Twitter Profile Photo

🚀 airgeddon v11.61 is out! VM detection added, Evil Twin sound alerts (with mute option), WPA3 menu improvements, better VPN compatibility, and multiple bug fixes. Enjoy! 🙃 🔧 Update recommended! #airgeddon #infosec #pentesting #wifi github.com/v1s1t0r1sh3r3/…

Rubén sg (@rsgbengii) 's Twitter Profile Photo

WiFi hacking isn’t magic. It’s fundamentals and proper hardware. I wrote a practical guide on WiFi security testing. Part 1 👇 kayssel.com/newsletter/iss… #InfoSec #CyberSec #Pentesting

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Pentesting starts with recon.nmap, nuclei, subdomains, SSL/TLS.This week’s newsletter breaks down the full infrastructure recon workflow from zero. Build the attack surface first kayssel.com/newsletter/iss… #Pentesting #CyberSecurity #infosec #BugBounty

Rubén sg (@rsgbengii) 's Twitter Profile Photo

WPA/WPA2 handshakes, PMKID, WPS, Evil Twins, and why WPA3 still isn’t bulletproof. Part 2 of my WiFi attacks series is out 👇 Let’s keep breaking WiFi. kayssel.com/newsletter/iss… #CyberSec #infosec #PenTesting

Rubén sg (@rsgbengii) 's Twitter Profile Photo

Breaking into enterprise WiFi 🔓 802.1X, Evil Twin, credential capture, legacy EAP abuse & Pass-the-Hash. Part 3 of the WiFi series 👇 kayssel.com/newsletter/iss… #CyberSecurity #infosecurity