Ozgur Alp (@ozgur_bbh) 's Twitter Profile
Ozgur Alp

@ozgur_bbh

All you need is a simple bug.

ID: 1216749516910735362

linkhttps://ozguralp.com calendar_today13-01-2020 15:51:14

813 Tweet

7,7K Followers

214 Following

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

Turkcell kullanıp da Github 2FA aktif olan var mıdır acaba? Turkcell ile ne konuştuysak ne yaptıysak bir türlü halledemedik. Başkalarında da aynı problemin olup olmadığını anlayabilirsem süper olacak. 1 aydır hesaba hiçbir şekilde erişemiyorum, şaka gibi.

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

If you still cannot find your first RCE vulnerability on bug bounty programs, here is my blog post about of Simple Remote Code Execution Vulnerability Examples for Beginners from 3 years ago, which I found mostly at Synack Red Team programs. Link: ozguralp.medium.com/simple-remote-…

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

Do you want to find different type of vulnerabilities that automatic scanners mostly missing? Here is a blog post that I wrote 3 years ago about Load Balancer, Shallow Copy and Cache problems that causes data leakages, resulting even account takeovers. link.medium.com/jC9QQK72VGb

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

If you are testing an application which is integrated within AWS document services and S3 buckets; here is my vulnerability write-up from 4 years ago which allowed me to view all sensitive files within bypassing the document signing mechanism. link.medium.com/gcm96FBJ7Gb

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

Do you have a blind error based SQL injection, which you cannot exploit further? If that's the case, here is my blog post titled "Turning Blind Error Based SQL Injection Into An Exploitable Boolean One" which covers an additional technique to exploit. link.medium.com/rNOGW2mujHb

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

Do you want to dive into the bug bounty platforms but still struggle how to start? Here is my non-technical advisory blog post from 2.5 years ago that I recommend all people who is interested to start bug hunting or newbie at the sector. Link: link.medium.com/cBKGfPSYuHb

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

I started seeing BigQuery SQL database more often at the applications that I tested. While it has a similar technology to other DBMS'es, it still has a unique syntax for exploitation. Here is my blog post from 2 years ago in case you missed it. link.medium.com/Ed5ybJoBBHb

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

Check out my latest technical post published at Synack blog, titled as “Multi-factor Authentication Bypass Examples via Response Tampering” synack.com/blog/multi-fac…

InfoSec Community (@infoseccomm) 's Twitter Profile Photo

Examine ways to get around multi-factor authentication, thanks to Ozgur Alp for investigating response manipulation scenarios. Check out more such cool stuff in 107th edition of IWWeekly Newsletter! weekly.infosecwriteups.com/iw-weekly-107/

Synack Red Team (@synackredteam) 's Twitter Profile Photo

Synack Red Team (SRT) member Ozgur Alp dives into two two real-world MFA bypass techniques via response tampering that were found in the Synack Platform during his time as an SRT member, starting from easiest to complicated. Read the full blog here → hubs.ly/Q02v6_Xc0

Alican Kiraz (@alicankiraz0) 's Twitter Profile Photo

Hi everyone! After a long period of work, I have completed the full analysis of the incident in Lebanon, as well as a detailed examination of one of the devices involved. I even demonstrated, with censored details, how certain modifications and additions could lead to an

Hi everyone! After a long period of work, I have completed the full analysis of the incident in Lebanon, as well as a detailed examination of one of the devices involved. I even demonstrated, with censored details, how certain modifications and additions could lead to an
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Interesting approach. The redirect seem to google calendar but it actually points to 'caiendar-redirect.xyz/gXX' , where the link will ask for the following nice permissions for the Twitter account (last screenshot).

Interesting approach.  The redirect seem to google calendar but it actually points to 'caiendar-redirect.xyz/gXX' , where the link will ask for the following nice permissions for the Twitter account (last screenshot).