Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @irsdl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @irsdl

  1. Prikvačeni tweet
    25. tra

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    31. lis

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    Prikaži ovu nit
    Poništi
  3. 31. lis

    Perhaps also join in even if you are a fan ;)

    Poništi
  4. 31. lis

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    Poništi
  5. proslijedio/la je Tweet
    27. lis

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    Poništi
  6. proslijedio/la je Tweet
    25. lis

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    Poništi
  7. proslijedio/la je Tweet
    25. lis

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    Poništi
  8. proslijedio/la je Tweet
    24. lis

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    21. lis

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    Poništi
  10. proslijedio/la je Tweet
    5. lis

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    Poništi
  11. proslijedio/la je Tweet
    17. lis
    Poništi
  12. 16. lis
    Poništi
  13. proslijedio/la je Tweet
    14. lis

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    Poništi
  14. proslijedio/la je Tweet
    14. lis

    This is so insane. This was a straight-forward solution for Buggy .Net from

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    12. lis

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    Poništi
  16. proslijedio/la je Tweet
    11. lis
    Odgovor korisnicima

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    Poništi
  17. 10. lis
    Poništi
  18. proslijedio/la je Tweet
    7. lis

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    Poništi
  19. proslijedio/la je Tweet
    6. lis
    Odgovor korisniku/ci
    Poništi
  20. 3. lis

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    Poništi
  21. 3. lis

    Just a friendly reminder that is still mine! 🤓 😇

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·