Nguyen The Duc

@ducnt_

Just another web warrior ⚔️ | Security Researcher | Sr. Security Engineer | CTF player && | Bug bounty hunter

Hồ Chí Minh, Việt Nam  
Şubat 2017 tarihinde katıldı

Tweetler

@ducnt_ adlı kişiyi engelledin

Bu Tweetleri görüntülemek istediğinden emin misin? Tweetleri görüntülemek @ducnt_ adlı kişinin engelini kaldırmaz.

  1. Sabitlenmiş Tweet
    31 Mar

    I really happy to share an article that bypass Akamai web application firewall and exploit a SQL Injection vulnerability. Hope this article will help someone in the same situation :).

    Bu Tweet dizisini göster
    Geri al
  2. Retweetledi
    47 dakika önce
    Geri al
  3. Retweetledi
    30 Nis

    The fuzzing team has been developing a new fuzzer to help identify security vulnerabilities in the implementation of WebAPIs in Firefox. This fuzzer, which we’re calling Domino, leverages the WebAPIs’ own WebIDL definitions as a fuzzing grammar.

    Bu Tweet dizisini göster
    Geri al
  4. Retweetledi
    29 Nis

    Detailing CVE-2020-0932 - a now patched RCE bug in reported to us by an anonymous researcher. The blog lays out how code exec is possible using TypeConverters and provides video demonstration and PoC. Read the post at

    Geri al
  5. Retweetledi
    27 Nis

    Releasing another side-project: CursedChrome. A Chrome-extension implant that turns victim Chrome browsers into HTTP proxies. Using these proxies you can browse the web authenticated as your victims for all of their websites. Setup takes only 5-10 mins 👍

    Bu Tweet dizisini göster
    Geri al
  6. Retweetledi
    27 Nis

    We’ve just published SitRep, our host triage tool developed by . It brings extensibility and OpSec considerations to the triage process:

    Geri al
  7. Retweetledi
    27 Nis

    Check out my write-up about an account takeover vulnerability I found in Microsoft Teams. By sending a GIF, you could get access to the user's data and "ultimately take over an organization's entire roster of Teams accounts".

    Bu Tweet dizisini göster
    Geri al
  8. Retweetledi
    25 Nis

    Exploit Proof-of-Concept for CVE-2020-12138, Privilege Escalation in ATI Technologies Inc. driver 'atillk64.sys'. Thanks to all those cited for helping me along the way.

    Bu Tweet dizisini göster
    Geri al
  9. Retweetledi
    24 Nis

    support added and pushed to master, go and automate all the takeovers and DNS related detections and vulnerabilities. We also updated guide document with DNS request template information

    Geri al
  10. Retweetledi
    28 Mar
    Geri al
  11. Retweetledi
    24 Nis

    v1.33 released with a ton of new features. Thanks to for the great PRs! You can see whats new here

    Geri al
  12. Retweetledi
    22 Nis

    New blog post: CVE-2020-0022 an Android 8.0-9.0 Bluetooth Zero-Click RCE – BlueFrag

    Geri al
  13. Retweetledi
    22 Nis
    Geri al
  14. Retweetledi
    16 Nis

    CVE-2020-7066 is a pretty neat SSRF vector in PHP; URL parsing differences strike yet again.

    Geri al
  15. Retweetledi
    21 Nis

    My writeup for the haproxy http2 bug (CVE-2020-11100) is now public: . Includes a PoC exploit to demonstrate RCE against Ubuntu 19.10.

    Geri al
  16. Retweetledi
    21 Nis
    Geri al
  17. Retweetledi
    21 Nis

    This is a simple story about how to control back to web app from SQL with SessionState deserialization (article only in Traditional Chinese)

    Geri al
  18. Retweetledi
    20 Nis

    It's here! Details on how we achieved RCE are available. Enjoy! "I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structs by ()

    Geri al
  19. Retweetledi
    19 Nis
    Geri al
  20. Retweetledi
    19 Nis

    New write up - "Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts"

    Geri al
  21. Retweetledi
    23 Mar

    POC: http://localhost:8000/test/?q=20) = 1 OR (select utl_inaddr.get_host_name((SELECT version FROM v%24instance)) from dual) is null%20 OR (1%2B1 analysis:

    Geri al

Yükleme biraz zaman alacak gibi görünüyor.

Twitter aşırı kapasiteyle çalışıyor ya da anlık sorunlar yaşıyor olabilir. Yeniden dene ya da daha fazla bilgi almak için Twitter Durumu sayfasını ziyaret et.

    Şunları da beğenebilirsin

    ·