Duty (@duty_1g) 's Twitter Profile
Duty

@duty_1g

Application Security Specialist | Red Teamer | Researcher at Synack Red Team | OSCP-OSCE-OSWE-ECPPT-CRTE/P/O | CTF Player @DeadSecCTF
Capturing flags since 2011

ID: 1248712237663084544

calendar_today10-04-2020 20:39:39

41 Tweet

377 Followers

117 Following

DeadSec (@deadsecctf) 's Twitter Profile Photo

DeadSec has just achieved an impressive 2nd place finish in the Incognito 4.0 CTF! Our team worked tirelessly to secure this achievement, and we're incredibly proud! And Congratulations to thehackerscrew for the 1st place!

DeadSec has just achieved an impressive 2nd place finish in the Incognito 4.0 CTF! Our team worked tirelessly to secure this achievement, and we're incredibly proud!

And Congratulations to <a href="/thehackerscrew1/">thehackerscrew</a> for the 1st place!
DeadSec (@deadsecctf) 's Twitter Profile Photo

DeadSec CTF 2023 has come to an epic conclusion! 🎉🔓 Huge congrats to all the participants who showcased their hacking skills and made it an unforgettable event. Special thanks to our sponsors (OffSec - Google Cloud - Wolfram) .

DeadSec CTF 2023 has come to an epic conclusion! 🎉🔓 Huge congrats to all the participants who showcased their hacking skills and made it an unforgettable event. 

Special thanks to our sponsors (<a href="/offsectraining/">OffSec</a> - <a href="/googlecloud/">Google Cloud</a> - <a href="/WolframResearch/">Wolfram</a>) .
DeadSec (@deadsecctf) 's Twitter Profile Photo

Writeup for backdooredness from the 2023 Asis CTF. It was fun learning about the inner workings of the NES environment! Check it out here👉 gold3nb0y.github.io/blog/posts/asi…

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

NetExec v1.4.0 has been released! 🎉 There is a HUGE number of new features and improvements, including: - backup_operator: Automatic priv esc for backup operators - Certificate authentication - NFS escape to root file system And much more! Full rundown: github.com/Pennyw0rth/Net…

NetExec v1.4.0 has been released! 🎉

There is a HUGE number of new features and improvements, including:
- backup_operator: Automatic priv esc for backup operators
- Certificate authentication
- NFS escape to root file system

And much more!
Full rundown:
github.com/Pennyw0rth/Net…
Tanto Security (@tantosecurity) 's Twitter Profile Photo

The post is at tantosec.com/blog/2025/06/i… and we hope you enjoy reading it as much as we enjoyed putting it together! ❤️

Duty (@duty_1g) 's Twitter Profile Photo

Check out my latest Exploit Explained Bug Bounty writeup for Synack Red Team 🚨 Turning Frontend Clues into Backend Compromise: Insecure Routing to RCE #Synack #CyberSecurity #ExploitExplained #AppSec #BugBounty #RCE #InfoSec synack.com/exploits-expla…

Synack (@synack) 's Twitter Profile Photo

Happy Monday! Start your week off right by reading how Synack Red Team member Duty pieced together a dangerous Remote Code Execution (#RCE) vulnerability while testing a customer using Synack’s Penetration Testing as a Service platform 👀: hubs.ly/Q03z3V2P0

Jose Enrique Hernandez (@_josehelps) 's Twitter Profile Photo

LOLdrivers.io now has SIEM queries and a tool section for those looking to operationalize the data. Thanks to Mehmet Ergene and The Haag™ for sharing the queries with the community! Also shout out to Tenable for sharing the Nessus plugin, Oddvar Moe for the

LOLdrivers.io now has SIEM queries and a tool section for those looking to operationalize the data. Thanks to <a href="/Cyb3rMonk/">Mehmet Ergene</a> and <a href="/M_haggis/">The Haag™</a> for sharing the queries with the community! 

Also shout out to <a href="/TenableSecurity/">Tenable</a> for sharing the Nessus plugin, <a href="/Oddvarmoe/">Oddvar Moe</a> for the
Mustafa Can İPEKÇİ (@mcipekci) 's Twitter Profile Photo

SQL injection tip of the day. On MySQL and its variants, you can use versioned comments. Let's say we are having potential SQLi on target, vulnerable parameter is id and we can only do blind injection attacks, but you are not sure about what DBMS is used. So, change value of

Mustafa Can İPEKÇİ (@mcipekci) 's Twitter Profile Photo

We earned a $15,000 bounty on HackerOne with manuel valdez⛩️! His persistence on the target paid off, uncovering SQLi leads on a major social network. The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.

We earned a $15,000 bounty on <a href="/Hacker0x01/">HackerOne</a> with <a href="/saur1n/">manuel valdez⛩️</a>! His persistence on the target paid off, uncovering SQLi leads on a major social network.

The exploit was straightforward once the query structure leaked due to verbose errors, revealing the injection point by commenting.