Soroush Dalili

@irsdl

Another ethical web appsec guy - breaker 〉builder - very limited BB hunter - delimiter characters fan - RT/LK can be an accident or not "'›|&;${3-1}\

World of Sec! 0xC0000005 Err
Sumali noong Agosto 2009

Mga Tweet

Binlock mo si @irsdl

Sigurado ka bang gusto mong tingnan ang mga Tweet na ito? Hindi maa-unblock ng pagtingin ang mga Tweet ni @irsdl

  1. Naka-pin na Tweet
    Abr 25

    With the release of my ViewState plugin for , here is my blog post on Exploiting Deserialisation in ASPNET via ViewState:

    Ipakita ang thread na ito
    I-undo
  2. Ni-retweet ni
    Okt 31

    Did you know you can use the Connection header to delete other headers? Interesting research lead by :

    Ipakita ang thread na ito
    I-undo
  3. Okt 31

    Perhaps also join in even if you are a fan ;)

    I-undo
  4. Okt 31

    Probably the last time I am doing this with this laptop - research continues! I am going to miss my stickers

    I-undo
  5. Ni-retweet ni
    Okt 27

    Oh shit there is a video that backs up the ‘don’t congratulate Obama’ .. Can’t wait for the announcement..

    I-undo
  6. Ni-retweet ni
    Okt 25

    As I'm currently missing and so can't troll in person here's a blog about the recent changes to my .NET Remoting Exploit tool to bypass Low Type Filtering .

    I-undo
  7. Ni-retweet ni
    Okt 25

    Advisory: OneDrive/SharePoint File Picker Access Token Hijacking - by Adam Roberts

    I-undo
  8. Ni-retweet ni
    Okt 24

    I know DoS attacks are deeply unsexy, and I'm still somewhat in shock that I ever wrote an entire post about them. The core aim of this post is to illustrate how in the right circumstances they can be fun, high-impact and profitable

    Ipakita ang thread na ito
    I-undo
  9. Ni-retweet ni
    Okt 21

    While not officially confirmed yet, this is very likely to be true. Also it’s worth remembering that some of the attacks results never see the light of public news because targets prefer to remain silent either for intel obervations or simply avoid empowering attackers by an ack.

    I-undo
  10. Ni-retweet ni
    Okt 5

    Can’t stress enough the importance of patching affected VPN products. We’re seeing multiple groups exploiting these vulnerabilities.

    I-undo
  11. Ni-retweet ni
    Okt 17
    I-undo
  12. Okt 16
    I-undo
  13. Ni-retweet ni
    Okt 14

    OWASP Birmingham is pleased to announce it's hosting a Capture the Flag meetup in November supported by Kainos and Secure Code Warrior

    I-undo
  14. Ni-retweet ni
    Okt 14

    This is so insane. This was a straight-forward solution for Buggy .Net from

    Ipakita ang thread na ito
    I-undo
  15. Ni-retweet ni
    Okt 12

    HITCON CTF 2019 Quals is ongoing now! and I designed an XSS challenge this time and there are two solutions at least, could you find that? :D http://3.114.5.202/

    I-undo
  16. Ni-retweet ni
    Okt 11
    Sumasagot kina

    Can't we have the old school instant (bit broken) render AND the new shiny render button, if we need it?

    I-undo
  17. Okt 10
    I-undo
  18. Ni-retweet ni
    Okt 7

    Updated my tool to exploit .NET remoting services to use a new (unpatched) technique to bypass Low Type Filter to get full serialization exploitation. Abuses the lease feature present on all MBR objects. . Don't use .NET remoting in production code!

    I-undo
  19. Ni-retweet ni
    Okt 6
    Sumasagot kay
    I-undo
  20. Okt 3

    This is the command to activate all the bots from 3 years ago: WAKE UP AGAIN AND JOIN THE COLLECTIVE NOW! He should really be proud of himself to type these words correctly!

    I-undo
  21. Okt 3

    Just a friendly reminder that is still mine! 🤓 😇

    I-undo

Ang paglo-load ay mukhang natatagalan.

Maaaring lumagpas na sa kapasidad ang Twitter o nakakaranas ng panandaliang problema. Subukan muli o bisitahin ang Twitter Status para sa karagdagang impormasyon.

    Maaari mo ring magustuhan

    ·