Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
Ağustos 2009 tarihinde katıldı

Tweetler

@irsdl adlı kişiyi engelledin

Bu Tweetleri görüntülemek istediğinden emin misin? Tweetleri görüntülemek @irsdl adlı kişinin engelini kaldırmaz.

  1. Sabitlenmiş Tweet
    25 Nis

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    Bu Tweet dizisini göster
    Geri al
  2. Retweetledi
    31 Eki

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    Bu Tweet dizisini göster
    Geri al
  3. 31 Eki

    Perhaps also join in even if you are a fan ;)

    Geri al
  4. 31 Eki

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    Geri al
  5. Retweetledi
    27 Eki

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    Geri al
  6. Retweetledi
    25 Eki

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    Geri al
  7. Retweetledi
    25 Eki

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    Geri al
  8. Retweetledi
    24 Eki

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Bu Tweet dizisini göster
    Geri al
  9. Retweetledi
    21 Eki

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    Geri al
  10. Retweetledi
    5 Eki

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    Geri al
  11. Retweetledi
    17 Eki
    Geri al
  12. 16 Eki
    Geri al
  13. Retweetledi
    14 Eki

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    Geri al
  14. Retweetledi
    14 Eki

    This is so insane. This was a straight-forward solution for Buggy .Net from

    Bu Tweet dizisini göster
    Geri al
  15. Retweetledi
    12 Eki

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    Geri al
  16. Retweetledi
    11 Eki
    adlı kullanıcılara yanıt olarak

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    Geri al
  17. 10 Eki
    Geri al
  18. Retweetledi
    7 Eki

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Geri al
  19. Retweetledi
    6 Eki
    adlı kullanıcıya yanıt olarak
    Geri al
  20. 3 Eki

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    Geri al
  21. 3 Eki

    Just a friendly reminder that is still mine! 🤓 😇

    Geri al

Yükleme biraz zaman alacak gibi görünüyor.

Twitter aşırı kapasiteyle çalışıyor ya da anlık sorunlar yaşıyor olabilir. Yeniden dene ya da daha fazla bilgi almak için Twitter Durumu sayfasını ziyaret et.

    Şunları da beğenebilirsin

    ·