Nguyen The Duc

@ducnt_

Just another web warrior | Security Researcher | Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Sumali noong Pebrero 2017

Mga Tweet

Binlock mo si @ducnt_

Sigurado ka bang gusto mong tingnan ang mga Tweet na ito? Hindi maa-unblock ng pagtingin ang mga Tweet ni @ducnt_

  1. Naka-pin na Tweet
    Ene 8
    I-undo
  2. Ni-retweet ni
    Hul 10, 2018

    Neatly bypassing Content Security Policy. Why 'unsafe-inline' is almost always a full-fledged XSS.

    Ipakita ang thread na ito
    I-undo
  3. Ni-retweet ni
    Peb 6
    I-undo
  4. Ni-retweet ni
    Peb 6

    Thanks to research, new stuff are being released for soon - as for the features, payload minimization, raw cmd command, and auto command encoding within JSON/XML messages are being released after the PR review by

    I-undo
  5. Ni-retweet ni
    Peb 6
    I-undo
  6. Ni-retweet ni
    Peb 5

    Checkra1n for Windows first demo!!🔥🔥 Coming Soon!!

    Ipakita ang thread na ito
    I-undo
  7. Ni-retweet ni
    Peb 3

    Here's my write-up for ’s CTF challenge!

    I-undo
  8. Ni-retweet ni
    Peb 3

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    I-undo
  9. Ni-retweet ni
    Ene 31

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    I-undo
  10. Ni-retweet ni
    Ene 31

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    I-undo
  11. Ni-retweet ni
    Ene 28

    .Net being open-source makes tracking these things cool. I just hope GitHub adds code navigation support for .net code soon as well. credit for the bug goes to of course.

    I-undo
  12. Ni-retweet ni
    Ene 28

    Also for the iPhone 11 Pro Max, iOS 13.3.1 beta3 Jailbreak

    I-undo
  13. Ni-retweet ni
    Ene 24

    Here are my (updated) slides from for my talk "Owning The Cloud Through SSRF & PDF Generators" with Chris Holt from . Big thank you to , , , , , and !

    I-undo
  14. Ni-retweet ni
    Ene 24
    I-undo
  15. Ni-retweet ni
    Ene 23

    The Bezos forensic report is not very good. The forensic analysis should be done by who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg

    Ipakita ang thread na ito
    I-undo
  16. Ni-retweet ni
    Ene 22

    This is a pretty good reminder that any invasive heuristics in the browser - be it XSS filters or privacy protections - often cause more problems than they address:

    I-undo
  17. Ni-retweet ni
    Ene 21

    Learn how an authenticated RCE vulnerability in < 5.2.4 allows attackers to bypass hardening mechanisms. Read more ->

    I-undo
  18. Ni-retweet ni
    Ene 18

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Ipakita ang thread na ito
    I-undo
  19. Ni-retweet ni
    Ene 18

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    I-undo
  20. Ni-retweet ni
    Ene 16
    I-undo
  21. Ni-retweet ni
    Ene 15

    CVE-2020-5504 SQLI in phpMyAdmin: A malicious user could inject custom SQL in place of their own username when creating queries to this page fix:

    I-undo

Ang paglo-load ay mukhang natatagalan.

Maaaring lumagpas na sa kapasidad ang Twitter o nakakaranas ng panandaliang problema. Subukan muli o bisitahin ang Twitter Status para sa karagdagang impormasyon.

    Maaari mo ring magustuhan

    ·