Nguyen The Duc

@ducnt_

Just another web warrior | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
2017年2月加入

推文

你已封鎖 @ducnt_

你確定要查看這些推文嗎?查看推文並不會將 @ducnt_ 解除封鎖

  1. 釘選的推文
    1月8日
    還原
  2. 2月27日

    Filed a duplicate with gr8 bug was found by but can reopen it with a triaged issue. Really a excited moment.

    還原
  3. 已轉推
    2月25日

    New blog post! Here is how you can use MSBuild’s UnregisterAssembly task to execute arbitrary code in a .NET assembly. ⤵️

    還原
  4. 已轉推
    2月21日

    Just wrote a new article about how I found a Remote Command Execution 0-day (CVE-2020-8813) via static analysis in Cacti v1.2.8 the popular infrastructure graphing solution. I also explained how to exploit it without authentication in some cases.

    還原
  5. 已轉推
    2月18日

    Slides from my talk on iMessage exploitation: More technical details in the blog post: Great conference again, thanks team! :)

    還原
  6. 已轉推
    2月18日

    [PoC] CVE-2020-0618 Microsoft SQL Server Reporting Services RCE Vulnerability POST /ReportServer/pages/ReportViewer.aspx HTTP/1.1 Host: target ... ... NavigationCorrector$PageState=NeedsCorrection&NavigationCorrector$ViewState=[PayloadHere]&__VIEWSTATE=

    此媒體可能含有敏感內容。 了解更多
    還原
  7. 已轉推
    2月18日

    Just published another remote code execution chain I exploited recently. I also wrote about how organizations can stop these attacks at the development stage - the key is convention over configuration.

    還原
  8. 已轉推
    2月11日

    さんとSpectreやXS-LeaksやCross-Origin-*ヘッダーについて話しました! / ep63 Cross Origin Info Leaks

    顯示此對話串
    還原
  9. 已轉推
    2月17日
    還原
  10. 已轉推
    2月13日
    還原
  11. 已轉推
    2月11日

    Blind SSRF exploitation En: Ru: What about port scanning using DNS-requests?

    還原
  12. 已轉推
    2月11日
    還原
  13. 已轉推
    2018年7月10日

    Neatly bypassing Content Security Policy. Why 'unsafe-inline' is almost always a full-fledged XSS.

    顯示此對話串
    還原
  14. 已轉推
    2月6日
    還原
  15. 已轉推
    2月6日

    Thanks to research, new stuff are being released for soon - as for the features, payload minimization, raw cmd command, and auto command encoding within JSON/XML messages are being released after the PR review by

    還原
  16. 已轉推
    2月6日
    還原
  17. 已轉推
    2月5日

    Checkra1n for Windows first demo!!🔥🔥 Coming Soon!!

    顯示此對話串
    還原
  18. 已轉推
    2月3日

    Here's my write-up for ’s CTF challenge!

    還原
  19. 已轉推
    2月3日

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    顯示此對話串
    還原
  20. 已轉推
    1月31日

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    還原
  21. 已轉推
    1月31日

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    還原

看來要一段時間讀取資料。

Twitter 可能已超出負載,或發生暫時性的小問題。請再試一次,或造訪 Twitter 狀態以取得更多資訊。

    你也可能也會喜歡

    ·