Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
2009年8月加入

推文

你已封鎖 @irsdl

你確定要查看這些推文嗎?查看推文並不會將 @irsdl 解除封鎖

  1. 釘選的推文
    4月25日

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    顯示此對話串
    還原
  2. 已轉推
    10月31日

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    顯示此對話串
    還原
  3. 10月31日

    Perhaps also join in even if you are a fan ;)

    還原
  4. 10月31日

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    還原
  5. 已轉推
    10月27日

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    還原
  6. 已轉推
    10月25日

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    還原
  7. 已轉推
    10月25日

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    還原
  8. 已轉推
    10月24日

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    顯示此對話串
    還原
  9. 已轉推
    10月21日

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    還原
  10. 已轉推
    10月5日

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    還原
  11. 已轉推
    10月17日
    還原
  12. 10月16日
    還原
  13. 已轉推
    10月14日

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    還原
  14. 已轉推
    10月14日

    This is so insane. This was a straight-forward solution for Buggy .Net from

    顯示此對話串
    還原
  15. 已轉推
    10月12日

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    還原
  16. 已轉推
    10月11日

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    還原
  17. 10月10日
    還原
  18. 已轉推
    10月7日

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    還原
  19. 已轉推
    10月6日
    回覆給
    還原
  20. 10月3日

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    還原
  21. 10月3日

    Just a friendly reminder that is still mine! 🤓 😇

    還原

看來要一段時間讀取資料。

Twitter 可能已超出負載,或發生暫時性的小問題。請再試一次,或造訪 Twitter 狀態以取得更多資訊。

    你也可能也會喜歡

    ·