Nguyen The Duc

@ducnt_

Just another web warrior | Security Researcher | Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Joined February 2017

Tweets

You blocked @ducnt_

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @ducnt_

  1. Pinned Tweet
    Jan 8
    Undo
  2. Retweeted
    10 Jul 2018

    Neatly bypassing Content Security Policy. Why 'unsafe-inline' is almost always a full-fledged XSS.

    Show this thread
    Undo
  3. Retweeted
    Feb 6
    Undo
  4. Retweeted
    Feb 6

    Thanks to research, new stuff are being released for soon - as for the features, payload minimization, raw cmd command, and auto command encoding within JSON/XML messages are being released after the PR review by

    Undo
  5. Retweeted
    Feb 5
    Undo
  6. Retweeted
    Feb 5

    Checkra1n for Windows first demo!!🔥🔥 Coming Soon!!

    Show this thread
    Undo
  7. Retweeted
    Feb 3

    Here's my write-up for ’s CTF challenge!

    Undo
  8. Retweeted
    Feb 3

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Undo
  9. Retweeted
    Jan 31

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Undo
  10. Retweeted
    Jan 30

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Undo
  11. Retweeted
    Jan 28

    .Net being open-source makes tracking these things cool. I just hope GitHub adds code navigation support for .net code soon as well. credit for the bug goes to of course.

    Undo
  12. Retweeted
    Jan 28

    Also for the iPhone 11 Pro Max, iOS 13.3.1 beta3 Jailbreak

    Undo
  13. Retweeted
    Jan 24

    Here are my (updated) slides from for my talk "Owning The Cloud Through SSRF & PDF Generators" with Chris Holt from . Big thank you to , , , , , and !

    Undo
  14. Retweeted
    Jan 24
    Undo
  15. Retweeted
    Jan 22

    The Bezos forensic report is not very good. The forensic analysis should be done by who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg

    Show this thread
    Undo
  16. Retweeted
    Jan 22

    This is a pretty good reminder that any invasive heuristics in the browser - be it XSS filters or privacy protections - often cause more problems than they address:

    Undo
  17. Retweeted
    Jan 21

    Learn how an authenticated RCE vulnerability in < 5.2.4 allows attackers to bypass hardening mechanisms. Read more ->

    Undo
  18. Retweeted
    Jan 18

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Show this thread
    Undo
  19. Retweeted
    Jan 17

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Undo
  20. Retweeted
    Jan 16
    Undo
  21. Retweeted
    Jan 14

    CVE-2020-5504 SQLI in phpMyAdmin: A malicious user could inject custom SQL in place of their own username when creating queries to this page fix:

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·