Nguyen The Duc

@ducnt_

Just another web warrior ⚔️ | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @ducnt_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ducnt_

  1. Prikvačeni tweet
    31. ožu

    I really happy to share an article that bypass Akamai web application firewall and exploit a SQL Injection vulnerability. Hope this article will help someone in the same situation :).

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 48 minuta
    Poništi
  3. proslijedio/la je Tweet
    30. tra

    The fuzzing team has been developing a new fuzzer to help identify security vulnerabilities in the implementation of WebAPIs in Firefox. This fuzzer, which we’re calling Domino, leverages the WebAPIs’ own WebIDL definitions as a fuzzing grammar.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. tra

    Detailing CVE-2020-0932 - a now patched RCE bug in reported to us by an anonymous researcher. The blog lays out how code exec is possible using TypeConverters and provides video demonstration and PoC. Read the post at

    Poništi
  5. proslijedio/la je Tweet
    27. tra

    Releasing another side-project: CursedChrome. A Chrome-extension implant that turns victim Chrome browsers into HTTP proxies. Using these proxies you can browse the web authenticated as your victims for all of their websites. Setup takes only 5-10 mins 👍

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. tra

    We’ve just published SitRep, our host triage tool developed by . It brings extensibility and OpSec considerations to the triage process:

    Poništi
  7. proslijedio/la je Tweet
    27. tra

    Check out my write-up about an account takeover vulnerability I found in Microsoft Teams. By sending a GIF, you could get access to the user's data and "ultimately take over an organization's entire roster of Teams accounts".

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    25. tra

    Exploit Proof-of-Concept for CVE-2020-12138, Privilege Escalation in ATI Technologies Inc. driver 'atillk64.sys'. Thanks to all those cited for helping me along the way.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    24. tra

    support added and pushed to master, go and automate all the takeovers and DNS related detections and vulnerabilities. We also updated guide document with DNS request template information

    Poništi
  10. proslijedio/la je Tweet
    28. ožu
    Poništi
  11. proslijedio/la je Tweet
    24. tra

    v1.33 released with a ton of new features. Thanks to for the great PRs! You can see whats new here

    Poništi
  12. proslijedio/la je Tweet
    22. tra

    New blog post: CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

    Poništi
  13. proslijedio/la je Tweet
    22. tra
    Poništi
  14. proslijedio/la je Tweet
    16. tra

    CVE-2020-7066 is a pretty neat SSRF vector in PHP; URL parsing differences strike yet again.

    Poništi
  15. proslijedio/la je Tweet
    21. tra

    My writeup for the haproxy http2 bug (CVE-2020-11100) is now public: . Includes a PoC exploit to demonstrate RCE against Ubuntu 19.10.

    Poništi
  16. proslijedio/la je Tweet
    21. tra
    Poništi
  17. proslijedio/la je Tweet
    21. tra

    This is a simple story about how to control back to web app from SQL with SessionState deserialization (article only in Traditional Chinese)

    Poništi
  18. proslijedio/la je Tweet
    20. tra

    It's here! Details on how we achieved RCE are available. Enjoy! "I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structs by ()

    Poništi
  19. proslijedio/la je Tweet
    19. tra
    Poništi
  20. proslijedio/la je Tweet
    19. tra

    New write up - "Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts"

    Poništi
  21. proslijedio/la je Tweet
    23. ožu

    POC: http://localhost:8000/test/?q=20) = 1 OR (select utl_inaddr.get_host_name((SELECT version FROM v%24instance)) from dual) is null%20 OR (1%2B1 analysis:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·