Muhammad Sarim Raza (@hackipy) 's Twitter Profile
Muhammad Sarim Raza

@hackipy

Breaking Security Legally

ID: 1277493989864767488

calendar_today29-06-2020 06:48:53

1,1K Tweet

97 Takipçi

679 Takip Edilen

N$ (@nav1n0x) 's Twitter Profile Photo

If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it can still be found. Intercept the request in Burp and replace the Accept header with: `Accept: ../../../../../../../../../../etc/passwd{{` #bugbountytips

If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it can still be found.

Intercept the request in Burp and replace the Accept header with: `Accept: ../../../../../../../../../../etc/passwd{{` #bugbountytips
Coffin (@coffinxp7) 's Twitter Profile Photo

Just dropped a new video on Web Cache Deception to Account Takeover packed with powerful bypass techniques. Don’t miss it! youtu.be/Epzi1fWwdKk?si…

chux (@chux13786509) 's Twitter Profile Photo

Bug Hunters 🔥 Ever stumbled upon this weird message? "WebSockets request was expected" If you did, congratz! You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools 💥💥💥 Search for this message in Censys/FOFA and your automation 🤑

Bug Hunters 🔥
Ever stumbled upon this weird message?
"WebSockets request was expected"

If you did, congratz!
You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools 💥💥💥
Search for this message in Censys/FOFA and your automation 🤑
Muhammad Sarim Raza (@hackipy) 's Twitter Profile Photo

I completed the Web Security Academy lab: JWT authentication bypass via algorithm confusion with no exposed key Web Security Academy portswigger.net/web-security/j…

Muhammad Sarim Raza (@hackipy) 's Twitter Profile Photo

I don’t get why bug hunters tweet stuff like ‘Had a great month’ and post a screenshot with everything censored… and the reports aren’t even triaged yet. Thanks to HackerOne for that trailing dot showing the status of every report. What exactly are you trying to show?

Winters (@arunkr1shnan) 's Twitter Profile Photo

I Researched Ruby class pollutions and discovered a new exploitation method, Rotate Chains, achieving 100% exploit success rate; also created a bi0s CTF 2025 challenge based on the technique which had 0 solves. Read the research/writeup: winters0x64.xyz/posts/post-2

Muhammad Sarim Raza (@hackipy) 's Twitter Profile Photo

I completed the Web Security Academy lab: Exploiting server-side parameter pollution in a query string Web Security Academy portswigger.net/web-security/a…

Critical Thinking - Bug Bounty Podcast (@ctbbpodcast) 's Twitter Profile Photo

Interesting technique by zere: When a cache deception requires a specific header/token that you can't directly provide, try chaining it with CSPT to make it exploitable.

Interesting technique by <a href="/j_zere/">zere</a>: 
When a cache deception requires a specific header/token that you can't directly provide, try chaining it with CSPT to make it exploitable.