Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
Đã tham gia tháng 8 năm 2009

Tweet

Bạn đã chặn @irsdl

Bạn có chắc muốn xem những Tweet này không? Xem Tweet sẽ không bỏ chặn @irsdl

  1. Tweet đã ghim
    25 thg 4

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    Hiện chuỗi hội thoại này
    Hoàn tác
  2. đã Tweet lại
    31 thg 10

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    Hiện chuỗi hội thoại này
    Hoàn tác
  3. 31 thg 10

    Perhaps also join in even if you are a fan ;)

    Hoàn tác
  4. 31 thg 10

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    Hoàn tác
  5. đã Tweet lại
    27 thg 10

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    Hoàn tác
  6. đã Tweet lại
    25 thg 10

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    Hoàn tác
  7. đã Tweet lại

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    Hoàn tác
  8. đã Tweet lại
    24 thg 10

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Hiện chuỗi hội thoại này
    Hoàn tác
  9. đã Tweet lại
    21 thg 10

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    Hoàn tác
  10. đã Tweet lại
    5 thg 10

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    Hoàn tác
  11. đã Tweet lại
    Hoàn tác
  12. 16 thg 10
    Hoàn tác
  13. đã Tweet lại
    14 thg 10

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    Hoàn tác
  14. đã Tweet lại
    14 thg 10

    This is so insane. This was a straight-forward solution for Buggy .Net from

    Hiện chuỗi hội thoại này
    Hoàn tác
  15. đã Tweet lại
    12 thg 10

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    Hoàn tác
  16. đã Tweet lại
    11 thg 10
    Đang trả lời

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    Hoàn tác
  17. 10 thg 10
    Hoàn tác
  18. đã Tweet lại
    7 thg 10

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Hoàn tác
  19. đã Tweet lại
    6 thg 10
    Đang trả lời
    Hoàn tác
  20. 3 thg 10

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    Hoàn tác
  21. 3 thg 10

    Just a friendly reminder that is still mine! 🤓 😇

    Hoàn tác

Tải trang có vẻ sẽ mất một lúc.

Twitter có thể đang bị quá tải hoặc tạm thời trục trặc. Thử lại hoặc truy cập Trạng thái Twitter để biết thêm thông tin.

    Bạn cũng có thể thích

    ·