Marcel SIneM(S)US · @simsus
218 followers · 5439 posts · Server social.tchncs.de
da_am · @anthony
62 followers · 16 posts · Server mast.mrrl.me

$50 usd to the person that can port over the PCOIP client (teradici, HP whatever it is these days) to NixOS.
docs.teradici.com/find/product

#bugbounty #nix

Last updated 1 year ago

Konstantin Weddige · @weddige
147 followers · 1008 posts · Server gruene.social

While bug bounty programmes can be a valuable tool for companies to maintain a high level of security, it can be very frustrating to report vulnerabilities through them.

I do not want to discuss the scope of the programme or the impact of the vulnerability with an analyst whose primary goal is to reduce the bounty. My primary goal is to get the vulnerability fixed. If you insist on haggling over the bounty, do it after that.

#bugbounty #triage #infosec

Last updated 1 year ago

sollee (e/Δ) · @sollee
11 followers · 24 posts · Server cyberplace.social
GitHub · @github
77 followers · 132 posts · Server techhub.social
dusoft · @dusoft
65 followers · 579 posts · Server fosstodon.org

Any tips on doing ethical vulnerability disclosure? I have tried to contact the affected company multiple times to no avail.
They don't have any bounty or security contact info published.

#security #vulnerability #disclosure #hacking #bugs #bugbounty

Last updated 1 year ago

Joe Lucas · @josephtlucas
61 followers · 122 posts · Server fosstodon.org

Project Jupyter launched a bug bounty for Server, Lab, and Hub. Go check it out!

blog.jupyter.org/european-comm

#infosec #bugbounty #python

Last updated 1 year ago

Nicola Ferrini · @nicferr
45 followers · 2404 posts · Server mastodon.uno
👾 Rene Rehme · @renereh1
665 followers · 147 posts · Server neos.social

It looks like an angle bracket is filtered on the backend. I need this operator for a time-based injection because there is no response output. Alternative filter evasion? .

#sqli #sqlinjection #payload #bugbounty #bugbountytiphelp

Last updated 1 year ago

Marcel SIneM(S)US · @simsus
203 followers · 4568 posts · Server social.tchncs.de

#bugbounty #evoting

Last updated 1 year ago

ApisNecros · @ApisNecros
94 followers · 1029 posts · Server ioc.exchange

Been out of the game for a bit on account of life moving fast, but after only a couple hours I managed to find a completely transparent vuln on a target. After building a strong case, it's now reported. Feels good, man 💪

#sqlinjection #cybersecurity #infosec #hacking #hacktheplanet #bugbounty

Last updated 1 year ago

WildTuna 🇷🇺 · @wildtuna
65 followers · 751 posts · Server social.exo.icu

При эксплуатации XSS не забывайте об элементе <math>, который может сделать любой HTML-элемент кликабельным при использовании браузера Firefox.

<math>
<xss href="javascript:alert(1337)">
Click Me
</xss>
</math>

#bugbounty #tips

Last updated 1 year ago

Lauritz · @lauritz
76 followers · 27 posts · Server ruhr.social

Additionally, it comes with some handy features such as basic Parameter Guessing, Proxy Configuration, Throttling, Exclusion for certain strings, Non-Headless mode, ...

PSA: I only tested it on macOS Ventura for now.

(3/3)

#xss #appsec #bugbounty

Last updated 1 year ago

Lauritz · @lauritz
75 followers · 20 posts · Server ruhr.social

[Blog Post] Unauthenticated to ATO using Gadget Chain

Just blogged about a vulnerability chain I recently discovered in a private bug bounty program:
security.lauritz-holtmann.de/p

TL;DR: If you encounter an SSO implementation, make sure to test the /callback endpoint for XSS within the OAuth/OIDC "error_description" parameter.

Always try to escalate "non-exploitable" XSS-vulns (Self-XSS, only possible when user has no active session, …) using SSO gadgets.

#xss #sso #bugbounty #vuejs #oidc #oauth

Last updated 1 year ago

Profoundly Nerdy · @profoundlynerdy
95 followers · 470 posts · Server bitbang.social

@craigmaloney Worse, I don't know of a single bank with a . New code equals new bugs.

#bugbounty

Last updated 1 year ago

Rules for Android Application Security

A collection of Semgrep rules derived from the for Android apps

Use the rules to scan them against decompiled APK files to find vulnerabilities

github.com/mindedsecurity/semg

#owasp #mastg #bugbounty #pentesting

Last updated 1 year ago

💉 AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice

gosecure.net/blog/2023/06/21/a

By @GoSecure_Inc

#infosec #cybersecurity #bugbounty

Last updated 1 year ago